Author of the publication

Detecting discriminatory risk through data annotation based on Bayesian inferences.

, , , and . FAccT, page 794-804. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploratory Testing as a Source of Technical Debt., , , and . IT Prof., 16 (3): 44-51 (2014)Identifying Risks in Datasets for Automated Decision-Making., , , and . EGOV, volume 12219 of Lecture Notes in Computer Science, page 332-344. Springer, (2020)Linked data approach for selection process automation in systematic reviews., , , , , and . EASE, page 31-35. IET - The Institute of Engineering and Technology / IEEE Xplore, (2011)An Exploratory Study on Technology Transfer in Software Engineering., , and . ESEM, page 86-95. IEEE Computer Society, (2015)Assessing the precision of FindBugs by mining Java projects developed at a university., , and . MSR, page 110-113. IEEE Computer Society, (2010)Bridging the gap: SE technology transfer into practice: study design and preliminary results., and . ESEM, page 52:1-52:4. ACM, (2014)Profiling Power Consumption on Desktop Computer Systems., , , and . ICT-GLOW, volume 6868 of Lecture Notes in Computer Science, page 110-123. Springer, (2011)Peer to peer for privacy and decentralization in the internet of things., , and . ICSE (Companion Volume), page 288-290. IEEE Computer Society, (2017)The CLoTH Simulator for HTLC Payment Networks with Introductory Lightning Network Performance Results., , , and . Information, 9 (9): 223 (2018)CLoTH: A Lightning Network Simulator., , and . SoftwareX, (2021)