Author of the publication

Schema-Driven Security Filter Generation For Distributed Data Integration.

, , , and . HotWeb, page 1-6. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A GESO based MPC approach to contour error control of networked motion control system., , , and . Int. J. Syst. Sci., 50 (11): 2216-2225 (2019)GSQCT: A solution to screening gene sequences for phylogenetics analysis., , , , , , , and . FSKD, page 2929-2933. IEEE, (2012)A computational model for data acquisition in SAXS., and . BCB, page 695-702. ACM, (2014)Selective bit-error checking at the MAC layer for voice over mobile ad hoc networks with IEEE 802.11., , , , and . WCNC, page 1240-1245. IEEE, (2004)Personalized Information Recommendation Model Based on Semantic Grid., and . CSO (1), page 52-57. IEEE Computer Society, (2009)On the implementation of college meticulous management., , and . ICMLC, page 1358-1361. IEEE, (2010)OntoLTCn: A Chinese Text Oriented Semi-auto Ontology Knowledge Discovery Tool., , and . CSSE (1), page 662-665. IEEE Computer Society, (2008)Device-Agnostic Log Anomaly Classification with Partial Labels., , , , , , and . IWQoS, page 1-6. IEEE, (2018)Detection of specific contamination events in water distribution system using ultraviolet spectra., , , , , and . I2MTC, page 1-6. IEEE, (2018)Shape Preserving Properties of Parametric Szász Type Operators on Unbounded Intervals., and . Symmetry, 15 (9): 1755 (September 2023)