Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The future of statistical disclosure control., and . CoRR, (2018)Integrating File and Record Level Disclosure Risk Assessment.. Inference Control in Statistical Databases, volume 2316 of Lecture Notes in Computer Science, page 126-134. Springer, (2002)The SESAME MED System., , , , , , , , , and 10 other author(s). TRECVID, National Institute of Standards and Technology (NIST), (2011)Provenance, Anonymisation and Data Environments: a Unifying Construction., , , and . CoRR, (2021)Integrating 1H MRS and deuterium labeled glucose for mapping the dynamics of neural metabolism in humans., , , , , , , , , and 2 other author(s). NeuroImage, (2022)Achieving k-anonymity Using Improved Greedy Heuristics for Very Large Relational Databases., , , , and . Trans. Data Priv., 6 (1): 1-17 (2013)The 2012 SESAME Multimedia Event Detection (MED) System., , , , , , , , , and 14 other author(s). TRECVID, National Institute of Standards and Technology (NIST), (2012)Using smartphones in cities to crowdsource dangerous road sections and give effective in-car warnings., , , , and . SEACHI@CHI, page 14-18. ACM, (2016)Constructive knowledge engineering., , , , and . Knowl. Based Syst., 8 (5): 259-267 (1995)Are 'pseudonymised' data always personal data? Implications of the GDPR for administrative data research in the UK., , , , , , , , and . Comput. Law Secur. Rev., 34 (2): 222-233 (2018)