Author of the publication

Ontology Based Information Retrieval for Learning Styles of Autistic People.

, and . HPAGC, volume 169 of Communications in Computer and Information Science, page 293-298. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal Mode-Checking for Runtime Monitoring of Privacy Policies., , , and . CAV, volume 8559 of Lecture Notes in Computer Science, page 131-149. Springer, (2014)Compressed Deep Learning Models with XAI for COVID-19 Detection Using CXR Images., , , , and . RTIP2R (2), volume 2027 of Communications in Computer and Information Science, page 54-66. Springer, (2023)Qapla: Policy compliance for database-backed systems., , , , and . USENIX Security Symposium, page 1463-1479. USENIX Association, (2017)Energy-Efficient Optimization Scheme for RIS-Assisted Communication Underlaying UAV with NOMA., , , , and . ICC, page 1-6. IEEE, (2022)Secure Compilation (Dagstuhl Seminar 21481)., , , and . Dagstuhl Reports, 11 (10): 173-204 (2021)CoVault: A Secure Analytics Platform., , , , , , , , , and . CoRR, (2022)Isolation Without Taxation: Near Zero Cost Transitions for SFI., , , , , , and . CoRR, (2021)Labeled Goal-Directed Search in Access Control Logic., , and . STM, volume 7783 of Lecture Notes in Computer Science, page 65-80. Springer, (2012)A Linear Logic of Authorization and Knowledge., , , , and . ESORICS, volume 4189 of Lecture Notes in Computer Science, page 297-312. Springer, (2006)Verification of Information Flow and Access Control Policies with Dependent Types., , and . IEEE Symposium on Security and Privacy, page 165-179. IEEE Computer Society, (2011)