Author of the publication

On Protecting Private Information in Social Networks: AProposal.

, and . ICDE, page 1603-1606. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavior-Inductive Data Modeling for Enterprise Information Systems., , and . J. Comput. Inf. Syst., 48 (1): 105-116 (2007)Efficient Web-Based Linkage of Short to Long Forms., , , and . WebDB, (2008)Constraints-Preserving Transformation from XML Document Type Definition to Relational Schema., and . ER, volume 1920 of Lecture Notes in Computer Science, page 323-338. Springer, (2000)Measuring the Optimality of Hadoop Optimization., , and . CoRR, (2013)On the Explanation of Factors Affecting E-Commerce Adoption., , and . ICIS, page 109-120. Association for Information Systems, (2001)Report on the First International VLDB Workshop on Clean Databases (CleanDB 2006)., and . SIGMOD Rec., 36 (1): 54-56 (2007)Not All Layers Are Equal: A Layer-Wise Adaptive Approach Toward Large-Scale DNN Training., , and . WWW, page 1851-1859. ACM, (2022)Gatekeeper: Quantifying the Impacts of Service to the Scientific Community., and . TPDL, volume 11799 of Lecture Notes in Computer Science, page 123-135. Springer, (2019)A PLAN for Tackling the Locust Crisis in East Africa: Harnessing Spatiotemporal Deep Models for Locust Movement Forecasting., , , , , , , , and . KDD, page 3595-3604. ACM, (2021)Alternative Approach for Combination of Fingers in Underwater Acoustic Communication., , , , and . IJDSN, 12 (4): 3137014:1-3137014:9 (2016)