Author of the publication

Selective message distribution with people-tagging in user-collaborative environments.

, and . CHI Extended Abstracts, page 4549-4554. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging., , and . ESORICS, volume 5789 of Lecture Notes in Computer Science, page 268-284. Springer, (2009)A technique for self-certifying tamper resistant software., and . QoP, page 12-14. ACM, (2007)Mobile App Security Risk Assessment: A Crowdsourcing Ranking Approach from User Comments., , , and . SDM, page 658-666. SIAM, (2015)Software Tamper Resistance Using Program Certificates., , and . SAFECOMP, volume 2788 of Lecture Notes in Computer Science, page 144-158. Springer, (2003)Higher Dependability and Security for Mobile Applications.. SPC, volume 3934 of Lecture Notes in Computer Science, page 89-103. Springer, (2006)Defending against the Pirate Evolution Attack., and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 147-158. Springer, (2009)Bayesian Methods for Practical Traitor Tracing., and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 194-206. Springer, (2007)Learning Out-of-Vocabulary Words in Intelligent Personal Agents., , and . IJCAI, page 4309-4315. ijcai.org, (2018)Multi-Step Spoken Language Understanding System Based on Adversarial Learning., , and . ICASSP, page 7673-7677. IEEE, (2021)An End-To-End Actor-Critic-Based Neural Coreference Resolution System., , and . ICASSP, page 7848-7852. IEEE, (2021)