Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A versatile biopotential acquisition analog front end IC with effective DC offset and ripple rejection., , , , , and . ISIC, page 504-507. IEEE, (2014)Data Security and Chase., and . Encyclopedia of Information Ethics and Security, IGI Global, (2007)Protection of Sensitive Data based on Reducts in a Distributed Knowledge Discovery System., and . MUE, page 762-766. IEEE Computer Society, (2007)Multi-granularity Classification Rule Discovery Using ERID., , and . RSKT, volume 5009 of Lecture Notes in Computer Science, page 491-499. Springer, (2008)Action Rule Extraction from a Decision Table: ARED., and . ISMIS, volume 4994 of Lecture Notes in Computer Science, page 160-168. Springer, (2008)Validating Secure Connections between Wireless Devices in Pervasive Computing Using Data Matrix.. MUE, page 186-190. IEEE Computer Society, (2008)Mining Non-redundant Reclassification Rules., and . IEA/AIE, volume 5579 of Lecture Notes in Computer Science, page 806-815. Springer, (2009)Privacy Aware Data Management and Chase.. Fundam. Informaticae, 78 (4): 507-524 (2007)Ensuring Data Security Against Knowledge Discovery in Distributed Information Systems., and . RSFDGrC (2), volume 3642 of Lecture Notes in Computer Science, page 548-557. Springer, (2005)Action rule discovery from incomplete data., , and . Knowl. Inf. Syst., 25 (1): 21-33 (2010)