<?xml version="1.0" encoding="UTF-8" ?>
		<urlset
			xmlns="https://www.sitemaps.org/schemas/sitemap/0.9"
			xmlns:xhtml="https://www.w3.org/1999/xhtml"
			xmlns:mobile="https://www.google.com/schemas/sitemap-mobile/1.0"
			xmlns:news="https://www.google.com/schemas/sitemap-news/0.9"
			xmlns:image="https://www.google.com/schemas/sitemap-image/1.1"
			xmlns:video="https://www.google.com/schemas/sitemap-video/1.1"
		>
      
    <url>
      <loc>https://hackernoon.com/exploring-benefits-of-using-alternative-search-engines</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/differences-in-top-search-results-between-google-and-alternative-search-engines</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/domain-classification-analyzing-source-types-in-search-engine-results</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/comparative-analysis-of-search-engine-results-using-google-trends-data</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/how-different-search-engines-display-and-prioritize-information</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/examining-source-diversity-in-web-search-a-comparative-study-of-top-search-engines</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/a-comparison-of-source-distribution-and-result-overlap-in-web-search-engines</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/the-visual-framing-of-covid-19-on-search-engines</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/what-led-to-vizualizing-the-covid-19-pandemic-the-the-theoretical-background</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/this-is-how-the-covid-19-pandemic-looks-like</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/this-is-what-a-pandemic-looks-like-an-authors-note-before-we-begin</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/understanding-the-privacy-risks-of-popular-search-engine-advertising-systems-related-work</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/understanding-the-privacy-risks-of-popular-search-engine-advertising-systemsmeasurement-methodology</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/understanding-the-privacy-risks-of-popular-search-engine-advertising-systems-background</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/understanding-the-privacy-risks-of-popular-search-engine-advertising-systems-abstract-and-intro</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/understanding-the-privacy-risks-of-popular-search-engine-advertising-systems-results</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/privacy-risks-of-search-engine-advertising-systems-conclusion-acknowledgments-and-references</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/understanding-the-privacy-risks-of-popular-search-engine-advertising-systems-limitations</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/online-information-of-vaccines-table-2-percentage-of-vaccine-negative-webpages-in-different-serps</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/online-information-of-vaccines-table-1-example-of-classification-of-webpages</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/online-information-of-vaccines-abstract-and-introduction</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/online-information-of-vaccines-results</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/online-information-of-vaccines-conclusion-and-references</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/online-information-of-vaccines-discussion</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/online-information-of-vaccines-web-search-and-content-analysis</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/online-information-of-vaccines-methods</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/additional-information-about-the-algorithmic-contract-design-experiments-what-you-should-know</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/algorithmic-contract-design-for-crowdsourced-ranking-what-was-left-out-of-section-3</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/algorithmic-contract-design-for-crowdsourced-ranking-omitted-proofs-from-section-2</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/algorithmic-contract-design-for-crowdsourced-ranking-definitions-you-should-know</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/algorithmic-contract-design-for-crowdsourced-ranking-conclusions-future-directions-and-references</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/algorithmic-contract-design-what-to-know-about-agents-with-unknown-disutilites</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/algorithmic-contract-design-for-crowdsourced-ranking-warm-up-agents-with-known-equal-disutility</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/algorithmic-contract-design-for-crowdsourced-ranking-an-introduction-to-get-you-started</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/a-comparative-algorithm-audit-of-conspiracies-on-the-net-limitations</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/a-comparative-algorithm-audit-of-conspiracies-on-the-net-abstract-and-introduction</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/a-comparative-algorithm-audit-of-conspiracies-on-the-net-conclusion-and-bibliography</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/a-comparative-algorithm-audit-of-conspiracies-on-the-net-methodology</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/a-comparative-algorithm-audit-of-conspiracies-on-the-net-results</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/a-comparative-algorithm-audit-of-conspiracies-on-the-net-discussion</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/a-comparative-algorithm-audit-of-conspiracies-on-the-net-research-questions</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/a-comparative-algorithm-audit-conspiracy-theories-in-the-online-environments</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/web-search-results-biases-inaccuracies-and-their-consequences</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
            <url>
            <loc>https://browserology.tech/about</loc>
              <priority>0.8</priority>
            <changefreq>daily</changefreq>
            </url>
            
		</urlset>