From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cor-Split: Defending Privacy in Data Re-publication from Historical Correlations and Compromised Tuples., и . SSDBM, том 5566 из Lecture Notes in Computer Science, стр. 562-579. Springer, (2009)Obfuscation of sensitive data in network flows., , , , и . INFOCOM, стр. 2372-2380. IEEE, (2012)Semantic Compression of Temporal Data.. WAIM, том 2118 из Lecture Notes in Computer Science, стр. 267-278. Springer, (2001)JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks., , и . IEEE Trans. Dependable Secur. Comput., 9 (3): 387-400 (2012)Beyond Anonymity in Location Based Services., и . SEBD, стр. 447-454. (2007)A Learning-based Approach to Information Release Control., , и . IICIS, том 140 из IFIP, стр. 83-105. Springer, (2003)Towards Highly Adaptive Services for Mobile Computing., , , , , , , и . MOBIS, том 158 из IFIP, стр. 121-134. (2004)Integrated Profiling of Users, Terminals, and Provisioning Environments., , и . The Handbook of Mobile Middleware, Auerbach Publications/CRC, (2006)The MARBLE Dataset: Multi-inhabitant Activities of Daily Living Combining Wearable and Environmental Sensors Data., , и . MobiQuitous, том 419 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 451-468. Springer, (2021)Let the objects tell what you are doing., , и . UbiComp Adjunct, стр. 773-782. ACM, (2016)