Author of the publication

A new perspective of privacy protection: Unique distinct l-SR diversity.

, , , and . PST, page 110-117. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bayesian Classification of Events for Task Labeling Using Workflow Models., and . Business Process Management Workshops, volume 17 of Lecture Notes in Business Information Processing, page 97-108. Springer, (2008)Expectation Propagation in GenSpace Graphs for Summarization., , and . DaWaK, volume 4654 of Lecture Notes in Computer Science, page 449-458. Springer, (2007)Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining., , , , , , and . ISMIS, volume 5722 of Lecture Notes in Computer Science, page 442-452. Springer, (2009)Efficient spatio-temporal data mining with GenSpace graphs., , , and . J. Appl. Log., 4 (2): 192-214 (2006)Finding Topics in Email Using Formal Concept Analysis and Fuzzy Membership Functions., , , , and . Canadian AI, volume 5032 of Lecture Notes in Computer Science, page 108-113. Springer, (2008)Privacy Measures for Free Text Documents: Bridging the Gap between Theory and Practice., , , and . TrustBus, volume 6863 of Lecture Notes in Computer Science, page 161-173. Springer, (2011)ESRS: A Case Selection Algorithm Using Extended Similarity-based Rough Sets., and . ICDM, page 609-612. IEEE Computer Society, (2002)Using Data Mining Methods to Predict Personally Identifiable Information in Emails., , , , , and . ADMA, volume 5139 of Lecture Notes in Computer Science, page 272-281. Springer, (2008)An Algorithm for Automatic Generation of a Case Base from a Database Using Similarity-Based Rough Approximation., and . HIS, page 571-582. Physica-Verlag, (2001)Automatic Detecting Documents Containing Personal Health Information., , , , and . AIME, volume 5651 of Lecture Notes in Computer Science, page 335-344. (2009)