Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Human-as-Sensors Approach to API Documentation Integration and Its Effects on Novice Programmers., , , and . SANER, page 197-206. IEEE, (2019)Elastic pathing: your speed is enough to track you., , , , , and . UbiComp, page 975-986. ACM, (2014)Private Browsing: an Inquiry on Usability and Privacy Protection., , , , and . WPES, page 97-106. ACM, (2014)Disaster mitigation by crowdsourcing hazard documentation., , and . GHTC, page 93-98. IEEE, (2014)Elastic Pathing: Your Speed is Enough to Track You., , , and . CoRR, (2014)Transforming Speed Sequences into Road Rays on the Map with Elastic Pathing., , , , , and . CoRR, (2017)A Novel Color Image Watermarking Method Based on Genetic Algorithm and Hybrid Neural Networks., , , , and . RSCTC, volume 4259 of Lecture Notes in Computer Science, page 806-814. Springer, (2006)A Novel Color Image Watermarking Method Based on Genetic Algorithm and Neural Networks., , , , and . ICONIP (3), volume 4234 of Lecture Notes in Computer Science, page 225-233. Springer, (2006)Free-Form Gesture Authentication in the Wild., , , and . CHI, page 3722-3735. ACM, (2016)Forgetting of Passwords: Ecological Theory and Data., , , , , and . USENIX Security Symposium, page 221-238. USENIX Association, (2018)