Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Brokers: Building Collections through Automated Negotiation., , , , , and . SETN, volume 3025 of Lecture Notes in Computer Science, page 13-22. Springer, (2004)PrivaSense: providing privacy protection for sensor networks., , , and . SenSys, page 415-416. ACM, (2007)Resource-Limited Hyper-Reproductions: Electronically Reproducing and Extending Lectures., , and . Multimedia Tools Appl., 6 (2): 181-197 (1998)A surface-based approach for classification of 3D neuroanatomic structures., , , and . Intell. Data Anal., 8 (6): 519-542 (2004)Multimedia Interfaces for E-Commerce., , , , , and . WebNet, page 445-450. AACE, (1999)Detecting Wormhole Attacks in Wireless Sensor Networks., , , and . Critical Infrastructure Protection, volume 253 of IFIP, page 267-279. Springer, (2007)Attack detection in time series for recommender systems., , , and . KDD, page 809-814. ACM, (2006)Patient Classification of fMRI Activation Maps., , , , , , and . MICCAI (2), volume 2879 of Lecture Notes in Computer Science, page 58-65. Springer, (2003)SCENS: A System for the Mediated Sharing of Sensitive Data., , , , , , , and . JCDL, page 263-. IEEE Computer Society, (2003)Neighboring Feature Clustering., , , , , and . SETN, volume 3955 of Lecture Notes in Computer Science, page 605-608. Springer, (2006)