Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantic blocking for Record Linkage., , , and . CCIA, volume 163 of Frontiers in Artificial Intelligence and Applications, page 141-149. IOS Press, (2007)Increasing Polynomial Regression Complexity for Data Anonymization., , , , and . IPC, page 29-34. IEEE Computer Society, (2007)More Hybrid and Secure Protection of Statistical Data Sets., , and . IEEE Trans. Dependable Sec. Comput., 9 (5): 727-740 (2012)A Review of Attribute Disclosure Control., , , and . Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence, Springer, (2015)Dex: high-performance exploration on large graphs for information retrieval., , , , , and . CIKM, page 573-582. ACM, (2007)Variable linkage for multimedia metadata schema matching., , and . Multimedia Tools Appl., 68 (3): 845-861 (2014)Empirical Analysis of Database Privacy Using Twofold Integrals., and . CIS (1), volume 3801 of Lecture Notes in Computer Science, page 1-8. Springer, (2005)Optimal Symbol Alignment Distance: A New Distance for Sequences of Symbols., , and . IEEE Trans. Knowl. Data Eng., 23 (10): 1541-1554 (2011)Using genetic algorithms for attribute grouping in multivariate microaggregation., , and . Intell. Data Anal., 18 (5): 819-836 (2014)On the Use of Aggregation Operators for Location Privacy., , and . IFSA/EUSFLAT Conf., page 489-494. (2009)