Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced mobile security using SIM encryption., , and . CTS, page 189-196. IEEE, (2014)A hybrid attribute based access control model applied to data in a hybrid cloud environment.. SYSTOR, page 150. ACM, (2022)What Is the Perception of Female and Male Software Professionals on Performance, Team Dynamics and Job Satisfaction? Insights from the Trenches., , , and . ICSE-SEIP, page 13-22. IEEE Computer Society, (2017)Approaching petascale - Approaching petascale computing.. SC, page 19. ACM Press, (2006)Method for secure credit card transaction., and . CTS, page 180-184. IEEE, (2013)Intervention Strategies for Increasing Engagement in Crowdsourcing: Platform, Predictions, and Experiments., , , , , and . IJCAI, page 3861-3867. IJCAI/AAAI Press, (2016)Learning About New Technologies Through Social Networks: Experimental Evidence on Nontraditional Stoves in Bangladesh., and . Mark. Sci., 34 (4): 480-499 (2015)Recruiting Messages Matter: Message Strategies to Attract Citizen Scientists., , , and . CSCW Companion, page 227-230. ACM, (2017)Optimizing Interventions via Offline Policy Evaluation: Studies in Citizen Science., , , , and . AAAI, page 1536-1544. AAAI Press, (2018)Context Sensitive Smart Device Command Recognition and Negotiation., , , , and . IoT360 (1), volume 150 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 314-330. Springer, (2014)