Author of the publication

Inferring Privacy Information from Social Networks.

, , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 154-165. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

KMeD: a Knowledge-based Multimedia Medical Distributed Database System., , and . Inf. Syst., 20 (2): 75-96 (1995)Detectors: Encapsulating Constraint Maintenance in Object-Oriented Databases., and . TOOLS (11), page 439-452. Prentice Hall, (1993)A Batch Service Scheduling Algorithm with Time-Out for Real-Time Distributed Processing Systems., and . ICDCS, page 250-257. IEEE Computer Society, (1987)A Knowledge-Based Approach for Retrieving Images by Content., , and . IEEE Trans. Knowl. Data Eng., 8 (4): 522-532 (1996)Fault Tolerant Locking (FTL) for Tightly Coupled Systems., and . Symposium on Reliability in Distributed Software and Database Systems, page 49-55. IEEE Computer Society, (1986)Reservation Channel Access Protocol for High Speed Local Networks with Star Configurations., , and . IEEE Trans. Computers, 32 (8): 763-766 (1983)Hierarchical Routing and Flow Control Policy (HRFC) for Packet Switched Networks., and . IEEE Trans. Computers, 29 (11): 971-977 (1980)Task Allocation and Precedence Relations for Distributed Real-Time Systems., and . IEEE Trans. Computers, 36 (6): 667-679 (1987)A Transaction-Based Approach to Vertical Partitioning for Relational Database Systems., and . IEEE Trans. Software Eng., 19 (8): 804-812 (1993)Buffer Behavior for Poisson Arrivals and Multiple Synchronous Constant Outputs.. IEEE Trans. Computers, 19 (6): 530-534 (1970)