Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring and analyzing the characteristics of Napster and Gnutella hosts., , and . Multimedia Syst., 9 (2): 170-184 (2003)The Emergence of Conventions in Online Social Networks., , , , and . ICWSM, The AAAI Press, (2012)Geographic Dissection of the Twitter Network., , , and . ICWSM, The AAAI Press, (2012)Exploring the design space of social network-based Sybil defenses., , , , , , and . COMSNETS, page 1-8. IEEE, (2012)An Analysis of Internet Content Delivery Systems., , , , and . OSDI, USENIX Association, (2002)Operating Systems Review 36, Special Issue, Winter 2002.Towards Trusted Cloud Computing., , and . HotCloud, USENIX Association, (2009)On the Impact of Choice Architectures on Inequality in Online Donation Platforms., , , , and . WWW, page 2623-2629. ACM, (2019)On Profile Linkability despite Anonymity in Social Media Systems., , , , and . WPES@CCS, page 25-35. ACM, (2016)Equitable Security: Optimizing Distribution of Nudges and Resources., , , and . ACM Conference on Computer and Communications Security, page 2270-2272. ACM, (2018)Inside the Walled Garden: Deconstructing Facebook's Free Basics Program., , , , , , and . Computer Communication Review, 47 (5): 12-24 (2017)