From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Case for 5G-aware video streaming applications., , , , , и . 5G-MeMZ@SIGCOMM, стр. 27-34. ACM, (2021)A variegated look at 5G in the wild: performance, power, and QoE implications., , , , , , , , , и 2 other автор(ы). SIGCOMM, стр. 610-625. ACM, (2021)A Critical Look at Decentralized Personal Data Architectures, , , , и . CoRR, (2012)What Happened to the Crypto Dream?, Part 2.. IEEE Secur. Priv., 11 (3): 68-71 (2013)Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites., , , , , , и . PACMHCI, 3 (CSCW): 81:1-81:32 (2019)Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States., и . eCrime, стр. 1-17. IEEE, (2021)Obfuscated databases and group privacy., и . CCS, стр. 102-111. ACM, (2005)Cookies That Give You Away: The Surveillance Implications of Web Tracking., , , , , , и . WWW, стр. 289-299. ACM, (2015)REVISE: A Tool for Measuring and Mitigating Bias in Visual Datasets., , и . ECCV (3), том 12348 из Lecture Notes in Computer Science, стр. 733-751. Springer, (2020)Formal Barriers to Longest-Chain Proof-of-Stake Protocols., , , и . EC, стр. 459-473. ACM, (2019)