Author of the publication

Protection of Personal Data Using Anonymization.

, , , , , , , , and . ICCSA (8), volume 12956 of Lecture Notes in Computer Science, page 447-459. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influence of External Source on KPI Equation., , , , and . ICCSA (4), volume 10963 of Lecture Notes in Computer Science, page 123-135. Springer, (2018)Distributed Computing Infrastructure Based on Dynamic Container Clusters., , , , and . ICCSA (2), volume 9787 of Lecture Notes in Computer Science, page 263-275. Springer, (2016)The Construction of the Parallel Algorithm Execution Schedule Taking into Account the Interprocessor Data Transfer., , , and . ICCSA (4), volume 10963 of Lecture Notes in Computer Science, page 61-77. Springer, (2018)Complex Situation Recognition on the Basis of Neural Networks in Shipboard Intelligence System., , and . International Conference on Computational Science (3), volume 2331 of Lecture Notes in Computer Science, page 564-573. Springer, (2002)Cognitive Computer Graphics for Information Interpretation in Real Time Intelligence Systems., , and . International Conference on Computational Science (1), volume 2329 of Lecture Notes in Computer Science, page 683-692. Springer, (2002)Peculiarities of Computer Simulation and Statistical Representation of Time-Spatial Metocean Fields., , and . International Conference on Computational Science (1), volume 2073 of Lecture Notes in Computer Science, page 463-472. Springer, (2001)Application of Multi-core Architecture to the MPDRoot Package for the Task ToF Events Reconstruction., , , and . ICCSA (5), volume 10408 of Lecture Notes in Computer Science, page 428-437. Springer, (2017)A Multilayer Approach to the Security of Blockchain Networks of the Future., , , , , , , and . ICCSA (Workshops 1), volume 13377 of Lecture Notes in Computer Science, page 205-216. Springer, (2022)Reconstruction of Stone Walls in Form of Polygonal Meshes from Archaeological Studies., , , , , and . ICCSA (4), volume 10963 of Lecture Notes in Computer Science, page 136-148. Springer, (2018)Complex Situations Simulation When Testing Intelligence System Knowledge Base., , and . International Conference on Computational Science (1), volume 2073 of Lecture Notes in Computer Science, page 453-462. Springer, (2001)