Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Evolving Constraints in Data Transformation for XML Data Warehousing., and . ADBIS (Workshops), volume 5968 of Lecture Notes in Computer Science, page 79-86. Springer, (2009)A hybrid approach to prevent composition attacks for independent data releases., , , , , and . Inf. Sci., (2016)A relative privacy model for effective privacy preservation in transactional data., , , , and . Concurr. Comput. Pract. Exp., (2019)On the Performances of Checking XML Key and Functional Dependency Satisfactions., and . OTM Conferences (2), volume 5871 of Lecture Notes in Computer Science, page 1254-1271. Springer, (2009)Mining Differential Dependencies: A Subspace Clustering Approach., , , and . ADC, volume 8506 of Lecture Notes in Computer Science, page 50-61. Springer, (2014)Building Diversified Multiple Trees for classification in high dimensional noisy biomedical data., , , and . Health Inf. Sci. Syst., 5 (1): 5 (2017)Recommending Personalized Interventions to Increase Employability of Disabled Jobseekers., , , , , , and . PAKDD (3), volume 13282 of Lecture Notes in Computer Science, page 92-104. Springer, (2022)Causal Disentanglement for Adversarial Defense., , , and . AI (1), volume 14471 of Lecture Notes in Computer Science, page 315-327. Springer, (2023)On the equivalence between FDs in XML and FDs in relations., , and . Acta Inf., 44 (3-4): 207-247 (2007)Efficient Mining of Non-derivable Emerging Patterns., , and . ADC, volume 9093 of Lecture Notes in Computer Science, page 244-256. Springer, (2015)