Author of the publication

An Approach of Trusted Program Generation for User-Responsible Privacy.

, , , and . UIC, volume 4611 of Lecture Notes in Computer Science, page 1159-1170. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Debugging Mobile Agent Systems., , , , , and . iiWAS, page 667. ACM, (2013)SMURF software architecture for low power mobile robots: experience in search and rescue operations., , , , , , and . SSRR, page 264-269. IEEE, (2022)Data Traffic Reduction for Mobile Agent Migration., , , and . ICAART (2), page 351-354. SciTePress, (2012)Assignment strategy selection for multi-car elevator group control using reinforcement learning., and . Int. J. Knowl. Web Intell., 3 (2): 163-179 (2012)Agent-Community-Network-Based Secure Collaboration Support System., , , , and . ATOP@AAMAS, volume 25 of Lecture Notes in Business Information Processing, page 234-255. Springer, (2008)Intrusion Detection Using Third-Parties Support., , , and . FTDCS, page 206-212. IEEE Computer Society, (2008)Improvement of Detection for Warning Students in E-learning Using Web Cameras., and . KES, volume 35 of Procedia Computer Science, page 747-756. Elsevier, (2014)Discovery of Frequent Tag Tree Patterns in Semistructured Web Documents., , , , , and . PAKDD, volume 2336 of Lecture Notes in Computer Science, page 341-355. Springer, (2002)Polynomial Time Matching Algorithms for Tree-Like Structured Patterns in Knowledge Discovery., , , , and . PAKDD, volume 1805 of Lecture Notes in Computer Science, page 5-16. Springer, (2000)Extraction of Tag Tree Patterns with Contractible Variables from Irregular Semistructured Data., , , , , , and . PAKDD, volume 2637 of Lecture Notes in Computer Science, page 430-436. Springer, (2003)