Author of the publication

Parallelizing Record Linkage for Disclosure Risk Assessment.

, , , , and . Privacy in Statistical Databases, volume 5262 of Lecture Notes in Computer Science, page 190-202. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Global Explanations for Credit Risk Scoring., , and . CoRR, (2018)Extending Microaggregation Procedures for Time Series Protection., and . RSCTC, volume 4259 of Lecture Notes in Computer Science, page 899-908. Springer, (2006)Using Copies to Remove Sensitive Data: A Case Study on Fair Superhero Alignment Prediction., , and . IbPRIA (1), volume 11867 of Lecture Notes in Computer Science, page 182-193. Springer, (2019)Possibilistic reasoning for trust-based access control enforcement in social networks., and . FUZZ-IEEE, page 1-6. IEEE, (2010)Citizens Sensor Networks., and . CitiSens, volume 7685 of Lecture Notes in Computer Science, page 1-5. Springer, (2012)On the Use of Social Trajectory-Based Clustering Methods for Public Transport Optimization., , and . CitiSens, volume 8313 of Lecture Notes in Computer Science, page 59-70. Springer, (2013)A Scalable and Efficient Iterative Method for Copying Machine Learning Classifiers., , , and . CoRR, (2023)Speed up gradual rule mining from stream data! A B-Tree and OWA-based approach., , and . J. Intell. Inf. Syst., 35 (3): 447-463 (2010)Tweet-SCAN: An event discovery technique for geo-located tweets., , , and . CCIA, volume 277 of Frontiers in Artificial Intelligence and Applications, page 110-119. IOS Press, (2015)Computing Reputation for Collaborative Private Networks., , , and . COMPSAC (1), page 246-253. IEEE Computer Society, (2009)