Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing Cybersecurity into the Wisconsin K-12 Classroom., , and . COMPSAC (2), page 312-317. IEEE, (2019)Exploring Parent-Child Perceptions on Safety in Generative AI: Concerns, Mitigation Strategies, and Design Implications., , , , and . CoRR, (2024)Improving Alignment and Robustness with Circuit Breakers., , , , , , , , , and . CoRR, (2024)A dynamic states reduction message passing algorithm for sparse code multiple access., , , and . WTS, page 1-5. IEEE, (2016)How the Great Recession affects performance: a case of Pennsylvania hospitals using DEA., , , , and . Ann. Oper. Res., 278 (1-2): 77-99 (2019)MAGICS: Adversarial RL with Minimax Actors Guided by Implicit Critic Stackelberg for Convergent Neural Synthesis of Robot Safety., , , and . CoRR, (2024)A 6G White Paper on Connectivity for Remote Areas., , , , , , , , , and 24 other author(s). CoRR, (2020)Gender Representation Among Contributors to Open-Source Infrastructure : An Analysis of 20 Package Manager Ecosystems., , , , , , , and . ICSE (SEIS), page 180-187. IEEE, (2023)Maximizing Page-Level Cache Hit Ratios in LargeWeb Services., , , and . SIGMETRICS Perform. Evaluation Rev., 46 (2): 91-92 (2018)Reversing Our Ways from x86 VM Configurations onto ARM-Based Raspberry Pis., , and . SIGCSE (2), page 1139. ACM, (2022)