Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LCCspm: l-Length Closed Contiguous Sequential Patterns Mining Algorithm to Find Frequent Athlete Movement Patterns from GPS., , and . ICMLA, page 455-460. IEEE, (2021)Synthesis of Rigorous Floating-Point Predicates., , and . SPIN, volume 13255 of Lecture Notes in Computer Science, page 44-60. Springer, (2022)Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search., , , , , , and . FOCI, USENIX Association, (2014)Global Measurement of DNS Manipulation., , , , , , and . USENIX Security Symposium, page 307-323. USENIX Association, (2017)The development of a methodology for the evaluation of Wide Area Detection Systems (WADS)., , , and . ICCST, page 1-5. IEEE, (2011)Markov Decision Processes with Contextual Nodes as a Method of Assessing Attacking Player Performance in Rugby League., , and . UKCI, volume 1409 of Advances in Intelligent Systems and Computing, page 251-263. Springer, (2021)Use of Kernel Density Estimation to Understand the Spatial Trends of Attacking Possessions in Rugby League., , , and . UKCI, volume 1454 of Advances in Intelligent Systems and Computing, page 214-225. Springer, (2022)An extended Algol-60 for Shaded Computer Graphics.. ACM Symposium on Graphic Languages, page 18-23. ACM, (1976)Network Error Logging: Client-side measurement of end-to-end web service reliability., , , , , , , , , and 1 other author(s). NSDI, page 985-998. USENIX Association, (2020)Can Censorship Measurements Be Safe(r)?, and . HotNets, page 1:1-1:7. ACM, (2015)