Author of the publication

'We are adults and deserve control of our phones': Examining the risks and opportunities of a right to repair for mobile apps.

, , , , , , and . FAccT, page 22-34. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learn2Weight: Parameter Adaptation against Similar-domain Adversarial Attacks.. COLING, page 4832-4843. International Committee on Computational Linguistics, (2022)Projected Subnetworks Scale Adaptation., and . CoRR, (2023)Reconfigurable Computing Cluster Project: Phase I Brief., , , and . FCCM, page 300-301. IEEE Computer Society, (2008)Scalability Studies of the BLASTn Scan and Ungapped Extension Functions., and . ReConFig, page 131-136. IEEE Computer Society, (2009)Multiple Modes for Continual Learning., and . CoRR, (2022)I Want My App That Way: Reclaiming Sovereignty Over Personal Devices., , and . CHI Extended Abstracts, page 393:1-393:8. ACM, (2021)Prompt Expansion for Adaptive Text-to-Image Generation., , , and . ACL (1), page 3449-3476. Association for Computational Linguistics, (2024)DeepObfusCode: Source Code Obfuscation through Sequence-to-Sequence Networks.. SAI (2), volume 284 of Lecture Notes in Networks and Systems, page 637-647. Springer, (2021)RC-BLASTn: Implementation and Evaluation of the BLASTn Scan Function., , and . FCCM, page 88-95. IEEE Computer Society, (2009)'We are adults and deserve control of our phones': Examining the risks and opportunities of a right to repair for mobile apps., , , , , , and . FAccT, page 22-34. ACM, (2023)