Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The development of a methodology for the evaluation of Wide Area Detection Systems (WADS)., , , and . ICCST, page 1-5. IEEE, (2011)LCCspm: l-Length Closed Contiguous Sequential Patterns Mining Algorithm to Find Frequent Athlete Movement Patterns from GPS., , and . ICMLA, page 455-460. IEEE, (2021)Synthesis of Rigorous Floating-Point Predicates., , and . SPIN, volume 13255 of Lecture Notes in Computer Science, page 44-60. Springer, (2022)Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search., , , , , , and . FOCI, USENIX Association, (2014)Global Measurement of DNS Manipulation., , , , , , and . USENIX Security Symposium, page 307-323. USENIX Association, (2017)Markov Decision Processes with Contextual Nodes as a Method of Assessing Attacking Player Performance in Rugby League., , and . UKCI, volume 1409 of Advances in Intelligent Systems and Computing, page 251-263. Springer, (2021)Use of Kernel Density Estimation to Understand the Spatial Trends of Attacking Possessions in Rugby League., , , and . UKCI, volume 1454 of Advances in Intelligent Systems and Computing, page 214-225. Springer, (2022)Is there a Liquid State Machine in the Bacterium Escherichia Coli?, , , and . ALIFE, page 187-191. IEEE, (2007)Ethical Concerns for Censorship Measurement., , , , and . NS Ethics@SIGCOMM, page 17-19. ACM, (2015)A Survey of Worldwide Censorship Techniques., , , , , and . RFC, (November 2023)