Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transforming Big Data into Collective Awareness., , , , , , , , and . Computer, 46 (6): 40-45 (2013)Homophily as a process generating social networks: insights from Social Distance Attachment model., and . CoRR, (2019)Detecting speculative bubbles created in experiments via decoupling in agent based models, , , , and . (Jun 12, 2008)Simulating the coordination of individual economic decisions, , , and . Physica A: Statistical Mechanics and its Applications, 287 (3-4): 613--630 (Dec 1, 2000)Why Simulate? To Develop a Mental Model., , and . J. Artif. Soc. Soc. Simul., (2013)Algorithmic Self-Governance and the Design of Socio-Technical Systems., , , , , and . ECSI, volume 1283 of CEUR Workshop Proceedings, page 262-273. CEUR-WS.org, (2014)Establishing a Base of Trust with Performance Counters for Enterprise Workloads., , , and . USENIX Annual Technical Conference, page 541-548. USENIX Association, (2015)Evaluation of Likelihood Functions for Data Analysis on Graphics Processing Units., , , , and . IPDPS Workshops, page 1349-1358. IEEE, (2011)Low-Overhead Dynamic Instruction Mix Generation Using Hybrid Basic Block Profiling., , , and . ISPASS, page 189-198. IEEE Computer Society, (2018)Privacy-by-Norms Privacy Expectations in Online Interactions., , , , , , , , , and 6 other author(s). SASO Workshops, page 1-6. IEEE Computer Society, (2015)