From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed computing with rules of thumb., , и . PODC, стр. 333-334. ACM, (2011)Selective private function evaluation with applications to private statistics., , , , , и . PODC, стр. 293-304. ACM, (2001)Probabilistic Quorum Systems., , и . PODC, стр. 267-273. ACM, (1997)Differentially Private Online Active Learning with Applications to Anomaly Detection., , и . AISec@CCS, стр. 117-128. ACM, (2016)The Experience of Near-Peer Computing Mentors: Strengthening and Expanding Women's Computing Identities in Undergraduate Interdisciplinary Contexts., , , , и . SIGCSE (1), стр. 1154-1160. ACM, (2024)Computing Fellows across Disciplines: Preliminary Results., , , , , и . SIGCSE (2), стр. 1310. ACM, (2023)Distributed Computing with Adaptive Heuristics., , и . ICS, стр. 417-443. Tsinghua University Press, (2011)Accountable Privacy (Transcript of Discussion).. Security Protocols Workshop, том 3957 из Lecture Notes in Computer Science, стр. 96-105. Springer, (2004)Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes., , , и . DISC, том 2508 из Lecture Notes in Computer Science, стр. 222-236. Springer, (2002)Off-Line Generation of Limited-Use Credit Card Numbers., и . Financial Cryptography, том 2339 из Lecture Notes in Computer Science, стр. 187-200. Springer, (2001)