Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Publishing Search Logs - A Comparative Study of Privacy Guarantees., , , , and . IEEE Trans. Knowl. Data Eng., 24 (3): 520-532 (2012)Data Publishing against Realistic Adversaries., , and . Proc. VLDB Endow., 2 (1): 790-801 (2009)MaskIt: privately releasing user context streams for personalized mobile applications., , and . SIGMOD Conference, page 289-300. ACM, (2012)Efficient algorithms for descendant-only tree pattern queries., , and . Inf. Syst., 34 (7): 602-623 (2009)Search in social networks with access control., , and . KEYS, page 4. ACM, (2010)On active learning of record matching packages., , and . SIGMOD Conference, page 783-794. ACM, (2010)A compositional framework for complex queries over uncertain data., and . ICDT, volume 361 of ACM International Conference Proceeding Series, page 149-161. ACM, (2009)Efficient Algorithms for the Tree Homeomorphism Problem., , and . DBPL, volume 4797 of Lecture Notes in Computer Science, page 17-31. Springer, (2007)Privacy in Search Logs, , , , and . CoRR, (2009)