Author of the publication

On breaching enterprise data privacy through adversarial information fusion.

, and . ICDE Workshops, page 246-249. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new information-theoretic dissimilarity for clustering time-dependent gene expression profiles modeled withradial basis functions., and . IJCNN, page 2857-2864. IEEE, (2008)A two-way multi-dimensional mixture model for clustering metagenomic sequences., and . BCB, page 191-200. ACM, (2011)Geoinformatic surveillance of hotspot detection, prioritization and early warning., , , , and . DG.O, volume 89 of ACM International Conference Proceeding Series, page 301-302. Digital Government Research Center, (2005)Guest Editorial: Pattern Recognition in Bioinformatics., , and . IEEE ACM Trans. Comput. Biol. Bioinform., 11 (3): 498-499 (2014)On Dempster-Shafer and bayesian detectors., , , and . IEEE Trans. Syst. Man Cybern. Syst., 36 (5): 688-692 (2006)Scheduling Multimedia Services in a Low-Power MAC for Wireless and Mobile ATM Networks., , , and . IEEE Trans. Multim., 1 (2): 187-201 (1999)Automatic Segmentation of Lung Regions in Chest Radiographs: A Model Guided Approach., , and . ICIP, page 483-486. IEEE, (2000)A study on using network flows in hierarchical QoS routing., and . GLOBECOM, page 2188-2192. IEEE, (2001)Performance analysis of capacity-aware state aggregation for inter-domain QoS routing., , and . GLOBECOM, page 1458-1463. IEEE, (2004)On scheduling of multimedia services in a low-power MAC for wireless ATM networks., , , and . PIMRC, page 243-247. IEEE, (1998)