Author of the publication

The spaces between us: setting and maintaining boundaries in wireless spectrum access.

, , and . MobiCom, page 37-48. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Migratory Behavior in Video Consumption., , , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1775-1788 (2021)Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers., , , and . USENIX Security Symposium, page 239-254. USENIX Association, (2014)Crowds on Wall Street: Extracting Value from Social Investing Platforms., , , , , , and . CoRR, (2014)Adversarial WiFi Sensing., , , , , , and . CoRR, (2018)Packet-Level Telemetry in Large Datacenter Networks., , , , , , , , , and 1 other author(s). SIGCOMM, page 479-491. ACM, (2015)User Authentication via Electrical Muscle Stimulation., , , , , and . CHI, page 6:1-6:15. ACM, (2021)Global Mixup: Eliminating Ambiguity with Clustering., , , , , and . AAAI, page 13798-13806. AAAI Press, (2023)Optimizing wireless multimedia transmissions through cross layer design.. ICME, page 185-188. IEEE Computer Society, (2003)Learning from the Dictionary: Heterogeneous Knowledge Guided Fine-tuning for Chinese Spell Checking., , , , , , , , , and . EMNLP (Findings), page 238-249. Association for Computational Linguistics, (2022)Integrating User History into Heterogeneous Graph for Dialogue Act Recognition., , , and . COLING, page 4211-4221. International Committee on Computational Linguistics, (2020)