Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uncertainty for Privacy and 2-Dimensional Range Query Distortion., , , and . JCSE, 5 (3): 210-222 (2011)A network aware privacy model for online requests in trajectory data., , and . Data Knowl. Eng., 68 (4): 431-452 (2009)An Integer Linear Programming Scheme to Sanitize Sensitive Frequent Itemsets., , , and . ICTAI, page 771-775. IEEE Computer Society, (2014)Services-based data management in a global computing environment., , and . WISE Workshops, page 45-53. IEEE Computer Society, (2003)TAILOR: A Record Linkage Tool Box., , and . ICDE, page 17-28. IEEE Computer Society, (2002)Efficient Record Linkage Using a Compact Hamming Space., , , and . EDBT, page 209-220. OpenProceedings.org, (2016)Foreword for the special issue of selected papers from the 1st ECML/PKDD Workshop on Privacy and Security issues in Data Mining and Machine Learning., , and . Trans. Data Privacy, 4 (3): 127-128 (2011)Challenges for privacy preservation in data integration., , and . J. Data and Information Quality, 5 (1-2): 4:1-4:3 (2014)Fast schemes for online record linkage., , and . Data Min. Knowl. Discov., 32 (5): 1229-1250 (2018)Duplicate Record Detection: A Survey., , and . IEEE Trans. Knowl. Data Eng., 19 (1): 1-16 (2007)