Author of the publication

k m -Anonymity for Continuous Data Using Dynamic Hierarchies.

, , , , and . Privacy in Statistical Databases, volume 8744 of Lecture Notes in Computer Science, page 156-169. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Warehouse Quality: A Review of the DWQ Project., and . IQ, page 299-313. MIT, (1997)From information system requirements to designs: a mapping framework., , , , , and . Inf. Syst., 16 (4): 429-461 (1991)Data Bases and Knowledge Bases: Which Approach is Good for What? - Panel., , , , and . ER, page 47-55. North-Holland, (1988)Rule-Based Management of Schema Changes at ETL Sources., , , , and . ADBIS (Workshops), volume 5968 of Lecture Notes in Computer Science, page 55-62. Springer, (2009)Adaptive Query Formulation to Handle Database Evolution., , and . CAiSE Forum, volume 231 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)Towards Automatic Structuring and Semantic Indexing of Legal Documents., , and . PCI, page 4. ACM, (2016)Evo-Path: Querying Data Evolution through Complex Changes., , , and . DATA, page 353-361. SCITEPRESS, (2021)Heuristic Algorithms for Designing a Data Warehouse with SPJ Views., , , and . DaWaK, volume 1676 of Lecture Notes in Computer Science, page 96-105. Springer, (1999)Legislation as a complex network: Modelling and analysis of European Union legal sources., , and . JURIX, volume 271 of Frontiers in Artificial Intelligence and Applications, page 143-152. IOS Press, (2014)Natural Language for Database Queries: A Laboratory Study, and . ACM Computing Surveys (CSUR), 17 (3): 313--340 (1985)