Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Browser Extension for Providing Visually Impaired Users Access to the Content of Bar Charts on the Web., , , , , and . WEBIST (2), page 59-66. INSTICC Press, (2007)Access to multimodal articles for individuals with sight impairments., , , , , , , , , and . ACM Trans. Interact. Intell. Syst., 2 (4): 21:1-21:49 (2012)Interactive SIGHT into information graphics., , , , , and . W4A, page 16. ACM, (2010)Interactive SIGHT demo: textual summaries of simple bar charts., , , , , and . ASSETS, page 267-268. ACM, (2010)Low-cost space-varying FIR filter architecture for computational imaging systems., , , and . Digital Photography, volume 7537 of SPIE Proceedings, page 75370. SPIE, (2010)Can Knowledge of Technical Debt Help Identify Software Vulnerabilities?, , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2016)Q: Exploit Hardening Made Easy., , and . USENIX Security Symposium, USENIX Association, (2011)Manhattanville College expert academic advisor - preliminary report (abstract only)., , , and . ACM Conference on Computer Science, page 352. ACM, (1987)Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring., , , and . USENIX Security Symposium, page 353-368. USENIX Association, (2013)Statistical Machine Translation Is a Natural Fit for Automatic Identifier Renaming in Software Source Code., , , , and . AAAI Workshops, volume WS-18 of AAAI Technical Report, page 771-774. AAAI Press, (2018)