Author of the publication

A Framework for the User-Oriented Personal Information Protection.

, and . Security and Management, page 12-19. CSREA Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Debugging Mobile Agent Systems., , , , , and . iiWAS, page 667. ACM, (2013)A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability., , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 433-442. Springer, (2005)Extraction of Tag Tree Patterns with Contractible Variables from Irregular Semistructured Data., , , , , , and . PAKDD, volume 2637 of Lecture Notes in Computer Science, page 430-436. Springer, (2003)Discovery of Frequent Tree Structured Patterns in Semistructured Web Documents., , , , and . PAKDD, volume 2035 of Lecture Notes in Computer Science, page 47-52. Springer, (2001)Discovery of Frequent Tag Tree Patterns in Semistructured Web Documents., , , , , and . PAKDD, volume 2336 of Lecture Notes in Computer Science, page 341-355. Springer, (2002)Polynomial Time Matching Algorithms for Tree-Like Structured Patterns in Knowledge Discovery., , , , and . PAKDD, volume 1805 of Lecture Notes in Computer Science, page 5-16. Springer, (2000)Data Traffic Reduction for Mobile Agent Migration., , , and . ICAART (2), page 351-354. SciTePress, (2012)Assignment strategy selection for multi-car elevator group control using reinforcement learning., and . Int. J. Knowl. Web Intell., 3 (2): 163-179 (2012)Shape refinement and rigging of raw-scanned 3D volume by a user-specified skeleton., , , and . Comput. Graph., (2020)Positioning Error Calibration of Industrial Robots Based on Random Forest., , , , , and . Int. J. Autom. Technol., 15 (5): 581-589 (2021)