Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regulating transparency?: Facebook, Twitter and the german network enforcement act., , , , and . FAT*, page 261-271. ACM, (2020)SGX-PySpark: Secure Distributed Data Analytics., , , and . WWW, page 3564-3563. ACM, (2019)Practical fundamental rights impact assessments., , and . Int. J. Law Inf. Technol., 30 (2): 200-232 (2022)The Security Implications of Data Subject Rights., and . IEEE Secur. Priv., 17 (6): 21-30 (2019)Explaining automated environments: interrogating scripts, logs, and provenance using voice-assistants., and . UbiComp/ISWC Adjunct, page 332-335. ACM, (2019)Monitoring AI Services for Misuse., , , and . AIES, page 597-607. ACM, (2021)Autoscaling Packet Core Network Functions with Deep Reinforcement Learning., , , , and . NOMS, page 1-6. IEEE, (2023)Seeing Human Rights at Sea: How to Align Tech Development with the Needs of Maritime Human Rights Investigators and Affected Communities., , , and . CHI Extended Abstracts, page 286:1-286:13. ACM, (2024)Mind The Gap: Designers and Standards on Algorithmic System Transparency for Users., , , and . CHI, page 476:1-476:16. ACM, (2024)A Survey on Soybean Seed Varieties and Defects Identification Using Neural Network., , , and . ACI@ISIC, volume 3283 of CEUR Workshop Proceedings, page 61-69. CEUR-WS.org, (2022)