Author of the publication

Clear Sanctions, Vague Rewards: How China's Social Credit System Currently Defines "Good" and "Bad" Behavior.

, , , , and . FAT, page 69-78. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Jens Keim University of Stuttgart

GALÆXI Validation: Taylor-Green Vortex, , , , , , , , and . Dataset, (2024)Related to: Kempf, Daniel et al. “GALÆXI: Solving complex compressible flows with high-order discontinuous Galerkin methods on accelerator-based systems.” (2024). arXiv: 2404.12703.
GALÆXI Validation: Taylor-Green Vortex, , , , , , , , and . Dataset, (2024)Related to: Kempf, Daniel et al. “GALÆXI: Solving complex compressible flows with high-order discontinuous Galerkin methods on accelerator-based systems.” (2024). arXiv: 2404.12703.GALÆXI Verification: Convergence Tests, , , , , , , , and . Dataset, (2024)Related to: Kempf, Daniel et al. “GALÆXI: Solving complex compressible flows with high-order discontinuous Galerkin methods on accelerator-based systems.” (2024). arXiv: 2404.12703.GALÆXI Scaling, , , , , , , , and . Dataset, (2024)Related to: Kempf, Daniel et al. “GALÆXI: Solving complex compressible flows with high-order discontinuous Galerkin methods on accelerator-based systems.” (2024). arXiv: 2404.12703.
 

Other publications of authors with the same name

Predicted and Observed User Behavior in the Weakest-link Security Game., , and . UPSEC, USENIX Association, (2008)When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information., and . WEIS, (2007)A Short Paper on the Incentives to Share Private Information for Population Estimates., , and . Financial Cryptography, volume 8975 of Lecture Notes in Computer Science, page 427-436. Springer, (2015)Security Games with Market Insurance., , and . GameSec, volume 7037 of Lecture Notes in Computer Science, page 117-130. Springer, (2011)Uncertainty in Interdependent Security Games., , , and . GameSec, volume 6442 of Lecture Notes in Computer Science, page 234-244. Springer, (2010)Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 339-356. USENIX Association, (2019)When cybercrimes strike undergraduates., , and . eCrime, page 42-51. IEEE, (2016)VaultIME: Regaining User Control for Password Managers through Auto-correction., , , , , and . ICST Trans. Security Safety, 4 (14): e4 (2018)Aware: Controlling App Access to I/O Devices on Mobile Platforms., , , , and . CoRR, (2016)Practical Integer Overflow Prevention., , and . CoRR, (2017)