Author of the publication

Validating Distance-Based Record Linkage with Probabilistic Record Linkage.

, and . CCIA, volume 2504 of Lecture Notes in Computer Science, page 207-215. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing Reputation for Collaborative Private Networks., , , and . COMPSAC (1), page 246-253. IEEE Computer Society, (2009)Towards Privacy Preserving Information Retrieval through Semantic Microaggregation., , and . Web Intelligence/IAT Workshops, page 296-299. IEEE Computer Society, (2010)978-0-7695-4191-4.On Distances for Cooperative Games and Non-additive Measures with Communication Situations., and . RSCTC, volume 8536 of Lecture Notes in Computer Science, page 262-269. Springer, (2014)An evolutionary approach to enhance data privacy., , and . Soft Comput., 15 (7): 1301-1311 (2011)Clustering-Based Categorical Data Protection., and . Privacy in Statistical Databases, volume 7556 of Lecture Notes in Computer Science, page 78-89. Springer, (2012)Extending Microaggregation Procedures for Time Series Protection., and . RSCTC, volume 4259 of Lecture Notes in Computer Science, page 899-908. Springer, (2006)Semantic Microaggregation for the Anonymization of Query Logs., , , and . Privacy in Statistical Databases, volume 6344 of Lecture Notes in Computer Science, page 127-137. Springer, (2010)On some clustering approaches for graphs., and . FUZZ-IEEE, page 409-415. IEEE, (2011)Possibilistic reasoning for trust-based access control enforcement in social networks., and . FUZZ-IEEE, page 1-6. IEEE, (2010)Soft Computing in decision modeling., and . Soft Comput., 14 (5): 419-420 (2010)