Author of the publication

Optimizing Interventions via Offline Policy Evaluation: Studies in Citizen Science.

, , , , and . AAAI, page 1536-1544. AAAI Press, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced mobile security using SIM encryption., , and . CTS, page 189-196. IEEE, (2014)What Is the Perception of Female and Male Software Professionals on Performance, Team Dynamics and Job Satisfaction? Insights from the Trenches., , , and . ICSE-SEIP, page 13-22. IEEE Computer Society, (2017)Software Agents for Use in Automatic Software Distribution., , , and . IKE, page 98-101. CSREA Press, (2004)Clustering of Vehicle Trajectories., , and . IEEE Trans. Intelligent Transportation Systems, 11 (3): 647-657 (2010)Learning About New Technologies Through Social Networks: Experimental Evidence on Nontraditional Stoves in Bangladesh., and . Marketing Science, 34 (4): 480-499 (2015)Method for secure credit card transaction., and . CTS, page 180-184. IEEE, (2013)Recruiting Messages Matter: Message Strategies to Attract Citizen Scientists., , , and . CSCW Companion, page 227-230. ACM, (2017)Approaching petascale - Approaching petascale computing.. SC, page 19. ACM Press, (2006)Intervention Strategies for Increasing Engagement in Crowdsourcing: Platform, Predictions, and Experiments., , , , , and . IJCAI, page 3861-3867. IJCAI/AAAI Press, (2016)Context Sensitive Smart Device Command Recognition and Negotiation., , , , and . IoT360 (1), volume 150 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 314-330. Springer, (2014)