Author of the publication

Sécurisation des entrepôts de données contre les inférences en utilisant les réseaux Bayésiens.

, , , and . EDA, volume B-6 of RNTI, page 35-47. Cépaduès, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering Aggregation for Improving Ant Based Clustering., , and . ICSI (1), volume 6728 of Lecture Notes in Computer Science, page 250-259. Springer, (2011)A Lane Detection and Tracking Method for Driver Assistance System., , and . KES (1), volume 6881 of Lecture Notes in Computer Science, page 407-417. Springer, (2011)Tracking Moving Objects in Road Traffic Sequences., , , and . ICISP, volume 7340 of Lecture Notes in Computer Science, page 406-414. Springer, (2012)UML models change impact analysis using a text similarity technique., , and . IET Softw., 11 (1): 27-37 (2017)Reuse of Semantic Business Process Patterns., , and . ICSOFT EA, page 36-47. SciTePress, (2014)Multidimensional concept extraction and validation from OLAP requirements in NL., , and . NLPKE, page 1-8. IEEE, (2009)From an Annotated BPMN Model to a Use Case Diagram: DESTINY Methodology., and . CISIS, volume 993 of Advances in Intelligent Systems and Computing, page 379-390. Springer, (2019)Structural and Behavioral Detection of Design Patterns., and . FGIT-ASEA, volume 59 of Communications in Computer and Information Science, page 16-24. Springer, (2009)Automated COSMIC-Based Analysis and Consistency Verification of UML Activity and Component Diagrams., , and . ENASE (Selected Papers), volume 417 of Communications in Computer and Information Science, page 48-63. Springer, (2013)Mutual information-based facial expression recognition., , and . ICMV, volume 9067 of SPIE Proceedings, page 90670G. SPIE, (2013)