Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Targeting and Signaling in Ad Auctions., , and . CoRR, (2017)Improving efficiency of wireless sensor networks through lightweight in-memory compression., , , , , , and . IGSC, page 1-8. IEEE Computer Society, (2015)Green computing: A life cycle perspective., , , , , , and . IGCC, page 1-6. IEEE Computer Society, (2013)Predicting advertiser bidding behaviors in sponsored search by rationality modeling., , , and . WWW, page 1433-1444. International World Wide Web Conferences Steering Committee / ACM, (2013)Mitigating the Curse of Correlation in Security Games by Entropy Maximization., , , and . AAMAS, page 2127-2129. International Foundation for Autonomous Agents and Multiagent Systems Richland, SC, USA / ACM, (2018)Berth Allocation Considering Fuel Consumption and Turnover Rate in the Mooring Period., , , , and . ICSAI, page 576-581. IEEE, (2018)Somersault cloud: Toward a cloud-of-clouds service for personal backup., , , and . ICNC, page 461-464. IEEE Computer Society, (2013)Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts., , , , , , , , and . IJCAI, page 381-387. ijcai.org, (2017)Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs., , , , and . IJCAI, page 681-688. AAAI Press, (2015)Information Design in the Principal-Agent Problem., , , and . CoRR, (2022)