Author of the publication

Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks.

, , , and . IEEE Internet Comput., 15 (3): 13-19 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Event-based QoS for a distributed continual query system., , and . IRI, page 530-535. IEEE Systems, Man, and Cybernetics Society, (2005)Achieving Consistent Real-Time Latency at Scale in a Commodity Virtual Machine Environment Through Socket Outsourcing-Based Network Stacks., , and . IEEE Access, (2018)EventMapper: Detecting Real-World Physical Events Using Corroborative and Probabilistic Sources., and . CoRR, (2020)Accessing Imprecise Data: An Approach Based on Intervals., and . IEEE Data Eng. Bull., 16 (2): 12-15 (1993)Superdatabases: Transactions Across Database Boundaries.. IEEE Data Eng. Bull., 10 (3): 19-25 (1987)Design and application of PDBlib, a C++ macromolecular class library., , , and . Comput. Appl. Biosci., 10 (6): 575-586 (1994)Relaxing the Limitations of Serializable Transactions in Distributed Systems.. ACM SIGOPS Oper. Syst. Rev., 27 (2): 66-71 (1993)Editorial: Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012)., , , and . Mob. Networks Appl., 19 (5): 634 (2014)An Object-Oriented Approach to Interoperation of Heterogeneous Information Sources., and . International Hong Kong Computer Society Database Workshop, page 49-63. Springer, Singapore, (1996)Detecting Bottleneck in n-Tier IT Applications Through Analysis., , , , and . DSOM, volume 4269 of Lecture Notes in Computer Science, page 149-160. Springer, (2006)