Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NetSHa: In-Network Acceleration of LSH-Based Distributed Search., , , , , , , , and . IEEE Trans. Parallel Distributed Syst., 33 (9): 2213-2229 (2022)Mobile App Squatting., , , , , , , , and . WWW, page 1727-1738. ACM / IW3C2, (2020)Embedding Structured Dictionary Entries., , , and . Insights, page 117-125. Association for Computational Linguistics, (2020)Echo Chambers within the Russo-Ukrainian War: The Role of Bipartisan Users., , , , and . ASONAM, page 154-158. ACM, (2023)The impact of Capitol Hill on Pleroma: the case for decentralised moderation., , , and . StudentWorkshop@CoNEXT, page 1-2. ACM, (2021)On Uploading Behavior and Optimizations of a Mobile Live Streaming Service., , , and . INFOCOM, page 1299-1308. IEEE, (2022)Antelope: A Framework for Dynamic Selection of Congestion Control Algorithms., , , , , , and . ICNP, page 1-11. IEEE, (2021)The Web We Weave: Untangling the Social Graph of the IETF., , , , , , , and . ICWSM, page 500-511. AAAI Press, (2022)Tackling spam in the era of end-to-end encryption: A case study of WhatsApp., , , , , and . CoRR, (2021)A Twitter Dataset for Pakistani Political Discourse., , , , , , and . CoRR, (2023)