From post

On-the-Fly Hierarchies for Numerical Attributes in Data Anonymization.

, и . Secure Data Management, том 6358 из Lecture Notes in Computer Science, стр. 13-25. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Bacterial persistence: Mathematical modeling and optimal treatment strategy., и . ACC, стр. 3502-3507. IEEE, (2011)On-the-Fly Hierarchies for Numerical Attributes in Data Anonymization., и . Secure Data Management, том 6358 из Lecture Notes in Computer Science, стр. 13-25. Springer, (2010)P-Sensitive K-Anonymity with Generalization Constraints., , и . Trans. Data Priv., 3 (2): 65-89 (2010)Genetic regulatory network identification using multivariate monotone functions., , и . CDC/ECC, стр. 2208-2213. IEEE, (2011)Augmented Reality Chinese Checkers., , , , , , , и . Advances in Computer Entertainment Technology, стр. 117-126. ACM, (2004)User-controlled generalization boundaries for p-sensitive k-anonymity., , и . SAC, стр. 1103-1104. ACM, (2010)On-the-Fly Generalization Hierarchies for Numerical Attributes Revisited., , и . Secure Data Management, том 6933 из Lecture Notes in Computer Science, стр. 18-32. Springer, (2011)Measuring the effects of manipulating stimulus presentation time on sensorimotor alpha and low beta reactivity during hand movement observation., , , и . NeuroImage, 57 (4): 1358-1363 (2011)Cortical excitability and the shape of the haemodynamic response., , и . NeuroImage, (2015)