<?xml version="1.0"?>
<dblpperson name="anonymous" pid="a/anonymous" n="29">
<person publtype="group" key="homepages/a/anonymous" mdate="2022-06-29">
<author pid="a/anonymous">anonymous</author>
<note>This is a pseudo name for persons who chose to publish anonymously.</note>
<url>https://en.wikipedia.org/wiki/Anonymous</url>
<url>https://www.wikidata.org/entity/Q4233718</url>
</person>
<r><data key="data/11/anonymous25" mdate="2025-11-21">
<author pid="a/anonymous">anonymous</author>
<title>Supplementary material for the SRL's proprioceptive sonification research.</title>
<year>2025</year>
<month>October</month>
<ee>https://doi.org/10.21227/8at2-ry10</ee>
<publisher>IEEE DataPort</publisher>
<stream>streams/repo/ieeedataport</stream>
</data>
</r>
<r><data key="data/11/anonymous25a" mdate="2025-12-02">
<author pid="a/anonymous">anonymous</author>
<title>Generalisation of Automated Algorithm Selection in Black-Box Optimisation: The Role of Algorithm Portfolio and Learning Model.</title>
<year>2025</year>
<month>October</month>
<ee>https://doi.org/10.21227/9rzf-e627</ee>
<publisher>IEEE DataPort</publisher>
<stream>streams/repo/ieeedataport</stream>
</data>
</r>
<r><data key="data/11/anonymous25b" mdate="2025-12-10">
<author pid="a/anonymous">anonymous</author>
<title>Benchmark-to-Benchmark Generalisation of Automated Algorithm Selection in Single-objective Black-Box Optimisation.</title>
<year>2025</year>
<month>September</month>
<ee>https://doi.org/10.21227/5z0a-d097</ee>
<publisher>IEEE DataPort</publisher>
<stream>streams/repo/ieeedataport</stream>
</data>
</r>
<r><data key="data/11/anonymous25c" mdate="2025-12-10">
<author pid="a/anonymous">anonymous</author>
<title>Diurnal Pulse-Aware Learning with Cross-Attention and Masked Convolution for Tropical Cyclone Rapid Intenisfication.</title>
<year>2025</year>
<month>September</month>
<ee>https://doi.org/10.21227/bas5-2r66</ee>
<publisher>IEEE DataPort</publisher>
<stream>streams/repo/ieeedataport</stream>
</data>
</r>
<r><data publtype="version" key="data/11/anonymousPFM25" mdate="2025-08-21">
<author pid="a/anonymous">anonymous</author>
<author orcid="0000-0002-6682-4243" pid="326/7899">Ranindya Paramitha</author>
<author orcid="0009-0007-0641-7260" pid="14/6701">Yuan Feng</author>
<author orcid="0000-0002-1091-8486" pid="59/6145">Fabio Massacci</author>
<title>Today's cat is tomorrow's dog: accounting for time-based changes in the labels of ML vulnerability detection approaches (Replication Package Part 2: Linux dataset).</title>
<year>2025</year>
<month>February</month>
<ee>https://doi.org/10.5281/zenodo.14803487</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="2" label="Version v3" uri="https://doi.org/10.5281/zenodo.10960662" type="versionOf">data/11/anonymousPFM24a</rel>
</data>
</r>
<r><data publtype="version" key="data/11/anonymousPFM25a" mdate="2025-10-27">
<author pid="a/anonymous">anonymous</author>
<author orcid="0000-0002-6682-4243" pid="326/7899">Ranindya Paramitha</author>
<author orcid="0009-0007-0641-7260" pid="14/6701">Yuan Feng</author>
<author orcid="0000-0002-1091-8486" pid="59/6145">Fabio Massacci</author>
<title>Today's cat is tomorrow's dog: accounting for time-based changes in the labels of ML vulnerability detection approaches (Replication Package Part 2: Linux dataset).</title>
<year>2025</year>
<month>April</month>
<ee type="oa">https://doi.org/10.5281/zenodo.15204601</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="3" label="Version 3" uri="https://doi.org/10.5281/zenodo.10960662" type="versionOf">data/11/anonymousPFM24a</rel>
</data>
</r>
<r><data publtype="version" key="data/11/anonymousPFM25b" mdate="2025-10-30">
<author pid="a/anonymous">anonymous</author>
<author orcid="0000-0002-6682-4243" pid="326/7899">Ranindya Paramitha</author>
<author orcid="0009-0007-0641-7260" pid="14/6701">Yuan Feng</author>
<author orcid="0000-0002-1091-8486" pid="59/6145">Fabio Massacci</author>
<title>Today's cat is tomorrow's dog: accounting for time-based changes in the labels of ML vulnerability detection approaches (Replication Package Part 2: Linux dataset).</title>
<year>2025</year>
<month>May</month>
<ee type="oa">https://doi.org/10.5281/zenodo.15433483</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="4" label="Version v4" uri="https://doi.org/10.5281/zenodo.10960662" type="versionOf">data/11/anonymousPFM24a</rel>
</data>
</r>
<r><data key="data/11/anonymousCRQ24" mdate="2025-06-11">
<author pid="a/anonymous">anonymous</author>
<author pid="378/0861">Tristan Coignion</author>
<author orcid="0000-0003-1771-8791" pid="52/2030">Romain Rouvoy</author>
<author orcid="0000-0003-3203-6107" pid="00/9990">Cl&#233;ment Quinton</author>
<title>A Performance Study of LLM-Generated Code on Leetcode - Code and Dataset artifacts.</title>
<year>2024</year>
<month>March</month>
<ee type="oa">https://doi.org/10.5281/zenodo.10829313</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="4" label="Version 2.0.1" uri="https://doi.org/10.5281/zenodo.7898304" type="versionOf"></rel>
</data>
</r>
<r><data key="data/11/anonymousGRCQR24" mdate="2025-08-07">
<author pid="a/anonymous">anonymous</author>
<author orcid="0000-0002-3335-5495" pid="300/9123">&#201;douard Gu&#233;gain</author>
<author orcid="0000-0002-8239-7683" pid="357/3470">R&#233;my Raes</author>
<author orcid="0009-0000-7388-3308" pid="409/3822">No&#233; Chachignot</author>
<author orcid="0000-0003-3203-6107" pid="00/9990">Cl&#233;ment Quinton</author>
<author orcid="0000-0003-1771-8791" pid="52/2030">Romain Rouvoy</author>
<title>AndroWatts: Unpacking the Power Consumption of Mobile Device's Components.</title>
<year>2024</year>
<month>December</month>
<ee type="oa">https://doi.org/10.5281/zenodo.14314943</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="1" label="Version 1" uri="https://doi.org/10.5281/zenodo.14314942" type="versionOf"></rel>
</data>
</r>
<r><data publtype="version" key="data/11/anonymousPFM24" mdate="2025-08-21">
<author pid="a/anonymous">anonymous</author>
<author orcid="0000-0002-6682-4243" pid="326/7899">Ranindya Paramitha</author>
<author orcid="0009-0007-0641-7260" pid="14/6701">Yuan Feng</author>
<author orcid="0000-0002-1091-8486" pid="59/6145">Fabio Massacci</author>
<title>Today's cat is tomorrow's dog: accounting for time-based changes in the labels of ML vulnerability detection approaches (Replication Package Part 2: Linux dataset).</title>
<year>2024</year>
<month>April</month>
<ee>https://doi.org/10.5281/zenodo.10960663</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="1" label="Version 1" uri="https://doi.org/10.5281/zenodo.10960662" type="versionOf">data/11/anonymousPFM24a</rel>
</data>
</r>
<r><data publtype="version" key="data/11/anonymousPFM24b" mdate="2025-10-30">
<author pid="a/anonymous">anonymous</author>
<author orcid="0000-0002-6682-4243" pid="326/7899">Ranindya Paramitha</author>
<author orcid="0009-0007-0641-7260" pid="14/6701">Yuan Feng</author>
<author orcid="0000-0002-1091-8486" pid="59/6145">Fabio Massacci</author>
<title>Today's cat is tomorrow's dog: accounting for time-based changes in the labels of ML vulnerability detection approaches (Replication Package Part 2: Linux dataset).</title>
<year>2024</year>
<month>May</month>
<ee type="oa">https://doi.org/10.5281/zenodo.15447675</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="5" label="Version v5" uri="https://doi.org/10.5281/zenodo.10960662" type="versionOf">data/11/anonymousPFM24a</rel>
</data>
</r>
<r><data publtype="version" key="data/11/anonymousSMFG24" mdate="2025-08-04">
<author pid="a/anonymous">anonymous</author>
<author orcid="0000-0002-0612-5790" pid="70/3474">Igor Steinmacher</author>
<author orcid="0000-0003-0759-1248" pid="412/3399">Jacob McAuley</author>
<author orcid="0000-0002-8055-9810" pid="412/3164">Katia Felizardo</author>
<author orcid="0000-0003-1399-7535" pid="68/5072">Marco Aur&#233;lio Gerosa</author>
<title>Can ChatGPT emulate humans in software engineering surveys? - ESEM '24.</title>
<year>2024</year>
<month>October</month>
<ee type="oa">https://doi.org/10.5281/zenodo.13975134</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="2" label="Version 2" uri="https://doi.org/10.5281/zenodo.10578333" type="versionOf">data/11/anonymousSMFG24b</rel>
</data>
</r>
<r><data publtype="version" key="data/11/anonymousSMFG24a" mdate="2025-08-04">
<author pid="a/anonymous">anonymous</author>
<author orcid="0000-0002-0612-5790" pid="70/3474">Igor Steinmacher</author>
<author orcid="0000-0003-0759-1248" pid="412/3399">Jacob McAuley</author>
<author pid="412/3164">Katia Felizardo</author>
<author orcid="0000-0003-1399-7535" pid="68/5072">Marco Aur&#233;lio Gerosa</author>
<title>Can ChatGPT emulate humans in software engineering surveys? - ESEM '24.</title>
<year>2024</year>
<month>October</month>
<ee type="oa">https://doi.org/10.5281/zenodo.13975333</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="3" label="Version 3" uri="https://doi.org/10.5281/zenodo.10578333" type="versionOf">data/11/anonymousSMFG24b</rel>
</data>
</r>
<r><article key="journals/gamestudies/anonymous22" mdate="2022-05-20">
<author pid="a/anonymous">anonymous</author>
<title>Reverse Engineering North Korea's Gaming Economy: Intellectual Property, Microtransactions, and Censorship.</title>
<year>2022</year>
<volume>22</volume>
<journal>Game Stud.</journal>
<number>1</number>
<ee type="oa">http://gamestudies.org/2201/articles/anonymous</ee>
<url>db/journals/gamestudies/gamestudies22.html#anonymous22</url>
</article>
</r>
<r><data key="data/10/AnonymousMWGCAMPW22" mdate="2024-08-31">
<author pid="a/anonymous">anonymous</author>
<author orcid="0000-0003-1303-4173" pid="236/5533">Jorge Melegati</author>
<author orcid="0000-0001-9943-5570" pid="06/10439">Igor Scaliante Wiese</author>
<author orcid="0000-0001-5555-3487" pid="65/1205">Eduardo Guerra 0001</author>
<author orcid="0000-0002-6293-7419" pid="90/2230">Rafael Chanin</author>
<author orcid="0000-0002-6405-1750" pid="179/8621">Abdullah Aldaeej</author>
<author orcid="0000-0002-8540-9918" pid="80/5814">Tommi Mikkonen</author>
<author orcid="0000-0003-3351-4916" pid="39/5605">Rafael Prikladnicki</author>
<author orcid="0000-0001-8424-419X" pid="99/2479-1">Xiaofeng Wang 0001</author>
<title>Supplemental package for a study on product managers in software startups.</title>
<year>2022</year>
<ee type="oa">https://doi.org/10.5281/zenodo.10070156</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="1" label="Version 2" uri="https://doi.org/10.5281/zenodo.7034251" type="versionOf"></rel>
</data>
</r>
<r><inproceedings key="conf/chi/Geenga20" mdate="2020-05-12">
<author pid="239/7899">Christine Geeng</author>
<author pid="a/anonymous">anonymous</author>
<title>EGregor: An Eldritch Privacy Mental Model for Smart Assistants.</title>
<pages>1-9</pages>
<year>2020</year>
<booktitle>CHI Extended Abstracts</booktitle>
<ee>https://doi.org/10.1145/3334480.3381827</ee>
<crossref>conf/chi/2020a</crossref>
<url>db/conf/chi/chi2020a.html#Geenga20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/anonymousNHGH20" mdate="2022-04-09">
<author pid="a/anonymous">anonymous</author>
<author orcid="0000-0002-4050-7012" pid="208/4182">Arian Akhavan Niaki</author>
<author pid="179/2240">Nguyen Phong Hoang</author>
<author pid="52/2893">Phillipa Gill</author>
<author pid="22/1797">Amir Houmansadr</author>
<title>Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior.</title>
<year>2020</year>
<booktitle>FOCI @ USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/foci20/presentation/anonymous</ee>
<crossref>conf/uss/2020foci</crossref>
<url>db/conf/uss/foci2020.html#anonymousNHGH20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vr/anonymous20" mdate="2020-05-19">
<author pid="a/anonymous">anonymous</author>
<title>Real or surreal: A pilot study on creative idea generation in MR vs. VR.</title>
<pages>677-678</pages>
<year>2020</year>
<booktitle>VR Workshops</booktitle>
<ee>https://doi.org/10.1109/VRW50115.2020.00189</ee>
<crossref>conf/vr/2020w</crossref>
<url>db/conf/vr/vr2020w.html#anonymous20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/siu/Authors18" mdate="2019-06-03">
<author pid="a/anonymous">anonymous</author>
<title>Accurate pupil boundary detection using angular integral projection and bezier curves.</title>
<pages>1-6</pages>
<year>2018</year>
<booktitle>SIU</booktitle>
<ee>https://doi.org/10.1109/SIU.2018.8404819</ee>
<crossref>conf/siu/2018</crossref>
<url>db/conf/siu/siu2018.html#Authors18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/TschantzAAP16" mdate="2023-03-24">
<author pid="45/1247">Michael Carl Tschantz</author>
<author pid="29/7562-1">Sadia Afroz 0001</author>
<author pid="a/anonymous">anonymous</author>
<author pid="p/VernPaxson">Vern Paxson</author>
<title>SoK: Towards Grounding Censorship Circumvention in Empiricism.</title>
<pages>914-933</pages>
<year>2016</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2016.59</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.2016.59</ee>
<crossref>conf/sp/2016</crossref>
<url>db/conf/sp/sp2016.html#TschantzAAP16</url>
</inproceedings>
</r>
<r><article key="journals/popets/BrandaoCDa15" mdate="2023-03-21">
<author orcid="0000-0002-4501-089X" pid="27/9681">Lu&#237;s T. A. N. Brand&#227;o</author>
<author orcid="0000-0002-2506-8031" pid="c/NicolasChristin">Nicolas Christin</author>
<author pid="11/1148">George Danezis</author>
<author pid="a/anonymous">anonymous</author>
<title>Toward Mending Two Nation-Scale Brokered Identification Systems.</title>
<pages>135-155</pages>
<year>2015</year>
<volume>2015</volume>
<journal>Proc. Priv. Enhancing Technol.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.1515/popets-2015-0022</ee>
<url>db/journals/popets/popets2015.html#BrandaoCDa15</url>
</article>
</r>
<r><article key="journals/jat/Nevai14" mdate="2021-02-16">
<author pid="95/3970">Paul Nevai</author>
<author pid="a/anonymous">anonymous</author>
<title>The Bernstein inequality and the Schur inequality are equivalent.</title>
<pages>103-109</pages>
<year>2014</year>
<volume>182</volume>
<journal>J. Approx. Theory</journal>
<ee type="oa">https://doi.org/10.1016/j.jat.2014.02.006</ee>
<url>db/journals/jat/jat182.html#Nevai14</url>
</article>
</r>
<r><inproceedings key="conf/icb/ParrisWHREFMaSLTMAB11" mdate="2023-03-24">
<author pid="117/2450">Jonathan Parris</author>
<author orcid="0000-0001-7040-0251" pid="46/11103">Michael J. Wilber</author>
<author pid="44/11103">Brian Heflin</author>
<author pid="40/7590">Ham M. Rara</author>
<author pid="11/10667">Ahmed El-Barkouky</author>
<author pid="55/6410">Aly A. Farag</author>
<author pid="41/4458">Javier R. Movellan</author>
<author pid="a/anonymous">anonymous</author>
<author orcid="0000-0002-8673-2725" pid="s/ModestoCastrillonSantana">Modesto Castrill&#243;n Santana</author>
<author orcid="0000-0002-2834-2067" pid="l/JavierLorenzoNavarro">Javier Lorenzo-Navarro</author>
<author pid="48/7573">Mohammad Nayeem Teli</author>
<author pid="31/5046">S&#233;bastien Marcel</author>
<author pid="78/8938">Cosmin Atanasoaei</author>
<author pid="08/6458">Terrance E. Boult</author>
<title>Face and eye detection on hard datasets.</title>
<pages>1-10</pages>
<year>2011</year>
<booktitle>IJCB</booktitle>
<ee>https://doi.org/10.1109/IJCB.2011.6117593</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IJCB.2011.6117593</ee>
<crossref>conf/icb/2011</crossref>
<url>db/conf/icb/ijcb2011.html#ParrisWHREFMaSLTMAB11</url>
</inproceedings>
</r>
<r><article key="journals/elearn/anonymous08" mdate="2020-09-08">
<author pid="a/anonymous">anonymous</author>
<title>Notes from the other side: kudos and complaints from my first e-learning experience.</title>
<pages>3</pages>
<year>2008</year>
<volume>2008</volume>
<journal>eLearn Mag.</journal>
<number>6</number>
<ee>https://doi.org/10.1145/1387950.1387956</ee>
<url>db/journals/elearn/elearn2008.html#anonymous08</url>
</article>
</r>
<r><article key="journals/dud/ZitzelsbergerH02" mdate="2010-12-20">
<author pid="a/anonymous">anonymous</author>
<author pid="46/1866">Guido Hogen</author>
<title>Die Chipkarte der Deutschen Kreditwirtschaft - &#220;bersicht und aktuelle Entwicklungen.</title>
<year>2002</year>
<volume>26</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>5</number>
<url>db/journals/dud/dud26.html#ZitzelsbergerH02</url>
</article>
</r>
<r><inproceedings key="conf/cade/Anonymous94" mdate="2022-05-05">
<author pid="a/anonymous">anonymous</author>
<title>The QED Manifesto.</title>
<pages>238-251</pages>
<year>1994</year>
<crossref>conf/cade/1994</crossref>
<booktitle>CADE</booktitle>
<url>db/conf/cade/cade94.html#Anonymous94</url>
<ee>https://dl.acm.org/doi/10.5555/648231.752823</ee>
</inproceedings>
</r>
<r><article key="journals/sigart/anonymous88" mdate="2020-05-19">
<author pid="a/anonymous">anonymous</author>
<title>Book review: Encyclopedia of Artifical Intelligence. Edited by S. C. Shapiro (Wiley-lnterscience, 1987).</title>
<pages>10-11</pages>
<year>1988</year>
<volume>105</volume>
<journal>SIGART Newsl.</journal>
<ee>https://doi.org/10.1145/49093.1058122</ee>
<url>db/journals/sigart/sigartn105.html#anonymous88</url>
</article>
</r>
<r><inproceedings key="conf/afips/anonymous62" mdate="2021-04-23">
<author pid="a/anonymous">anonymous</author>
<title>EDP as a national resource.</title>
<pages>71-72</pages>
<year>1962</year>
<booktitle>AFIPS Fall Joint Computing Conference</booktitle>
<ee>https://doi.org/10.1145/1461518.1461525</ee>
<crossref>conf/afips/1962f</crossref>
<url>db/conf/afips/afips1962f.html#anonymous62</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aieeire/anonymous55" mdate="2021-04-22">
<author pid="a/anonymous">anonymous</author>
<title>Statements from manufacturers on standardization of magnetic tape records.</title>
<pages>90-94</pages>
<year>1955</year>
<booktitle>AIEE-IRE Computer Conference (Eastern)</booktitle>
<ee>https://doi.org/10.1145/1455319.1455336</ee>
<crossref>conf/aieeire/1955e</crossref>
<url>db/conf/aieeire/aieeire1955e.html#anonymous55</url>
</inproceedings>
</r>
<coauthors n="47" nc="5">
<co c="2"><na f="a/Afroz_0001:Sadia" pid="29/7562-1">Sadia Afroz 0001</na></co>
<co c="1"><na f="a/Aldaeej:Abdullah" pid="179/8621">Abdullah Aldaeej</na></co>
<co c="0"><na f="a/Atanasoaei:Cosmin" pid="78/8938">Cosmin Atanasoaei</na></co>
<co c="0"><na f="b/Boult:Terrance_E=" pid="08/6458">Terrance E. Boult</na></co>
<co c="2"><na f="b/Brand=atilde=o:Lu=iacute=s_T=_A=_N=" pid="27/9681">Lu&#237;s T. A. N. Brand&#227;o</na></co>
<co c="3"><na f="c/Chachignot:No=eacute=" pid="409/3822">No&#233; Chachignot</na></co>
<co c="1" n="2"><na f="c/Chanin:Rafael_Matone" pid="90/2230">Rafael Matone Chanin</na><na>Rafael Chanin</na></co>
<co c="2"><na f="c/Christin:Nicolas" pid="c/NicolasChristin">Nicolas Christin</na></co>
<co c="3"><na f="c/Coignion:Tristan" pid="378/0861">Tristan Coignion</na></co>
<co c="2"><na f="d/Danezis:George" pid="11/1148">George Danezis</na></co>
<co c="0"><na f="e/El=Barkouky:Ahmed" pid="11/10667">Ahmed El-Barkouky</na></co>
<co c="0"><na f="f/Farag:Aly_A=" pid="55/6410">Aly A. Farag</na></co>
<co c="1"><na f="f/Felizardo:Katia" pid="412/3164">Katia Felizardo</na></co>
<co c="4"><na f="f/Feng:Yuan" pid="14/6701">Yuan Feng</na></co>
<co c="-1"><na f="g/Geeng:Christine" pid="239/7899">Christine Geeng</na></co>
<co c="1"><na f="g/Gerosa:Marco_Aur=eacute=lio" pid="68/5072">Marco Aur&#233;lio Gerosa</na></co>
<co c="2"><na f="g/Gill:Phillipa" pid="52/2893">Phillipa Gill</na></co>
<co c="3"><na f="g/Gu=eacute=gain:=Eacute=douard" pid="300/9123">&#201;douard Gu&#233;gain</na></co>
<co c="1"><na f="g/Guerra_0001:Eduardo" pid="65/1205">Eduardo Guerra 0001</na></co>
<co c="0"><na f="h/Heflin:Brian" pid="44/11103">Brian Heflin</na></co>
<co c="2"><na f="h/Hoang:Nguyen_Phong" pid="179/2240">Nguyen Phong Hoang</na></co>
<co c="-1"><na f="h/Hogen:Guido" pid="46/1866">Guido Hogen</na></co>
<co c="2"><na f="h/Houmansadr:Amir" pid="22/1797">Amir Houmansadr</na></co>
<co c="0"><na f="l/Lorenzo=Navarro:Javier" pid="l/JavierLorenzoNavarro">Javier Lorenzo-Navarro</na></co>
<co c="0"><na f="m/Marcel:S=eacute=bastien" pid="31/5046">S&#233;bastien Marcel</na></co>
<co c="4"><na f="m/Massacci:Fabio" pid="59/6145">Fabio Massacci</na></co>
<co c="1"><na f="m/McAuley:Jacob" pid="412/3399">Jacob McAuley</na></co>
<co c="1"><na f="m/Melegati:Jorge" pid="236/5533">Jorge Melegati</na></co>
<co c="1"><na f="m/Mikkonen:Tommi" pid="80/5814">Tommi Mikkonen</na></co>
<co c="0"><na f="m/Movellan:Javier_R=" pid="41/4458">Javier R. Movellan</na></co>
<co c="-1"><na f="n/Nevai:Paul" pid="95/3970">Paul Nevai</na></co>
<co c="2"><na f="n/Niaki:Arian_Akhavan" pid="208/4182">Arian Akhavan Niaki</na></co>
<co c="4"><na f="p/Paramitha:Ranindya" pid="326/7899">Ranindya Paramitha</na></co>
<co c="0"><na f="p/Parris:Jonathan" pid="117/2450">Jonathan Parris</na></co>
<co c="2"><na f="p/Paxson:Vern" pid="p/VernPaxson">Vern Paxson</na></co>
<co c="1"><na f="p/Prikladnicki:Rafael" pid="39/5605">Rafael Prikladnicki</na></co>
<co c="3"><na f="q/Quinton:Cl=eacute=ment" pid="00/9990">Cl&#233;ment Quinton</na></co>
<co c="3"><na f="r/Raes:R=eacute=my" pid="357/3470">R&#233;my Raes</na></co>
<co c="0"><na f="r/Rara:Ham_M=" pid="40/7590">Ham M. Rara</na></co>
<co c="3"><na f="r/Rouvoy:Romain" pid="52/2030">Romain Rouvoy</na></co>
<co c="0"><na f="s/Santana:Modesto_Castrill=oacute=n" pid="s/ModestoCastrillonSantana">Modesto Castrill&#243;n Santana</na></co>
<co c="1"><na f="s/Steinmacher:Igor" pid="70/3474">Igor Steinmacher</na></co>
<co c="0"><na f="t/Teli:Mohammad_Nayeem" pid="48/7573">Mohammad Nayeem Teli</na></co>
<co c="2"><na f="t/Tschantz:Michael_Carl" pid="45/1247">Michael Carl Tschantz</na></co>
<co c="1"><na f="w/Wang_0001:Xiaofeng" pid="99/2479-1">Xiaofeng Wang 0001</na></co>
<co c="1"><na f="w/Wiese:Igor_Scaliante" pid="06/10439">Igor Scaliante Wiese</na></co>
<co c="0" n="2"><na f="w/Wilber:Kimberly" pid="46/11103">Kimberly Wilber</na><na>Michael J. Wilber</na></co>
</coauthors>
</dblpperson>

