Reverse Engineering North Korea's Gaming Economy: Intellectual Property, Microtransactions, and Censorship.
Game Stud., 2022
Supplemental package for a study on product managers in software startups.
Dataset, 2022
Real or surreal: A pilot study on creative idea generation in MR vs. VR.
Proceedings of the 2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2020
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior.
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020
EGregor: An Eldritch Privacy Mental Model for Smart Assistants.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020
Accurate pupil boundary detection using angular integral projection and bezier curves.
Proceedings of the 26th Signal Processing and Communications Applications Conference, 2018
SoK: Towards Grounding Censorship Circumvention in Empiricism.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Toward Mending Two Nation-Scale Brokered Identification Systems.
Proc. Priv. Enhancing Technol., 2015
The Bernstein inequality and the Schur inequality are equivalent.
J. Approx. Theory, 2014
Face and eye detection on hard datasets.
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011
Notes from the other side: kudos and complaints from my first e-learning experience.
eLearn Mag., 2008
Die Chipkarte der Deutschen Kreditwirtschaft - Übersicht und aktuelle Entwicklungen.
Datenschutz und Datensicherheit, 2002
Proceedings of the Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26, 1994
Book review: Encyclopedia of Artifical Intelligence. Edited by S. C. Shapiro (Wiley-lnterscience, 1987).
SIGART Newsl., 1988
EDP as a national resource.
Proceedings of the 1962 fall joint computer conference, 1962
Statements from manufacturers on standardization of magnetic tape records.
Proceedings of the Papers and discussions presented at the the eastern joint AIEE-IRE computer conference: Computers in business and industrial systems, 1955