Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hierarchical Clustering Algorithm for Characterizing Social Media Users., , , and . WWW (Companion Volume), page 353-362. ACM / IW3C2, (2020)Probabilistic Anonymity., and . PinKDD, volume 4890 of Lecture Notes in Computer Science, page 56-79. Springer, (2007)Anonymizing Tables., , , , , , and . ICDT, volume 3363 of Lecture Notes in Computer Science, page 246-258. Springer, (2005)Auditing SQL Queries., , and . ICDE, page 287-296. IEEE Computer Society, (2008)Architecting the Database Access for a IT Infrastructure and Data Center Monitoring Tool., , , , , , , , , and . ICDE Workshops, page 351-354. IEEE Computer Society, (2012)Generating Queries with Cardinality Constraints for DBMS Testing., , and . IEEE Trans. Knowl. Data Eng., 18 (12): 1721-1725 (2006)Two Can Keep A Secret: A Distributed Architecture for Secure Database Services., , , , , , , , and . CIDR, page 186-199. (2005)A toolbox for fast and approximate solutions for large linear and semidefinite programs., , and . COMPUTE, page 8:1-8:8. ACM, (2014)Data Privacy Using MASKETEERTM., , , , and . ICTAC, volume 7521 of Lecture Notes in Computer Science, page 151-158. Springer, (2012)Querying priced information in databases: The conjunctive case., , , , , , , and . ACM Trans. Algorithms, 3 (1): 9:1-9:22 (2007)