Author of the publication

International Workshop on Cybersafety Chairs' Welcome & Organization.

, , , , , and . WWW (Companion Volume), page 981-982. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault-tolerant mutual exclusion algorithms., and . J. Syst. Softw., 11 (2): 111-129 (1990)MapReduce System over Heterogeneous Mobile Devices., , and . SEUS, volume 5860 of Lecture Notes in Computer Science, page 168-179. Springer, (2009)The Timewheel Group Membership Protocol., , and . IPPS/SPDP Workshops, volume 1388 of Lecture Notes in Computer Science, page 664-680. Springer, (1998)Detection of Cyberbullying Incidents on the Instagram Social Network., , , , , and . CoRR, (2015)Batch Rekeying in Mykil Key Management System., , and . IASTED PDCS, page 607-612. IASTED/ACTA Press, (2005)A Flexible and Intrusion Tolerant Voting Mechanism.. CATA, page 265-270. ISCA, (2005)Communication and Synchronization Models in Mobile Agent-Based Computing Systems., and . PDCS, page 442-447. ISCA, (2001)Optimizing and Extending Serverless Platforms: A Survey., , , , and . SDS, page 1-8. IEEE, (2021)Features for mood prediction in social media., , and . ASONAM, page 1580-1581. ACM, (2015)Identifying Differentiating Factors for Cyberbullying in Vine and Instagram., , , , and . SIMBig, volume 1410 of Communications in Computer and Information Science, page 348-361. Springer, (2020)