Author of the publication

Privacy Enforcement in Data Analysis Workflows

, , , and . Proceedings of the Workshop on Privacy Enforcement and Accountability with Semantics (PEAS2007) at ISWC/ASWC2007, Busan, South Korea, (November 2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Enforcement in Data Analysis Workflows, , , and . Proceedings of the Workshop on Privacy Enforcement and Accountability with Semantics (PEAS2007) at ISWC/ASWC2007, Busan, South Korea, (November 2007)Incremental Mining of Frequent Patterns without Candidate Generation or Support Constraint., and . IDEAS, page 111-116. IEEE Computer Society, (2003)Context-Dependent Implicit Authentication for Wearable Device User., and . CoRR, (2020)Opportunistic Implicit User Authentication for Health-Tracking IoT Wearables., , , and . CoRR, (2021)Proteus: a reconfigurable computational network for computer vision., , , , , , , , , and 8 other author(s). ICPR (4), page 43-54. IEEE, (1992)Implicit IoT authentication using on-phone ANN models and breathing data., , and . Internet Things, (December 2023)Proteus: A reconfigurable computational network for computer vision., , , , , , , , , and 8 other author(s). Mach. Vis. Appl., 8 (2): 85-100 (1995)Using CMAF to deliver high resolution immersive video with ultra-low end to end latency for live streaming., , , , and . MHV, page 1-6. ACM, (2022)A Design of Artificial Intelligence Education., , , , , and . TALE, page 1-8. IEEE, (2023)A research demonstration of code bubbles., , , , , , , , and . ICSE (2), page 293-296. ACM, (2010)978-1-60558-719-6.