Author of the publication

Privacy Protection: Regulations and Technologies, Opportunities and Threats.

, , , , , , , and . Mobility, Data Mining and Privacy, Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrity Constraints Evolution in Deductive Databases., and . GULP-PRODE, page 160-168. (1995)Bias in data-driven artificial intelligence systems—An introductory survey, , , , , , , , , and 13 other author(s). WIREs Data Mining and Knowledge Discovery, (February 2020)Bias in data-driven artificial intelligence systems - An introductory survey., , , , , , , , , and 13 other author(s). WIREs Data Mining Knowl. Discov., (2020)The Type System of LML., , , and . Types in Logic Programming, The MIT Press, (1992)Mining Influence Rules out of Ontologies., and . ICSOFT (2), page 323-333. SciTePress, (2011)What Else Can Be Extracted from Ontologies? Influence Rules., and . ICSOFT (Selected Papers), volume 303 of Communications in Computer and Information Science, page 270-285. Springer, (2011)Magma2: A Language Oriented toward Experiments in Control.. ACM Trans. Program. Lang. Syst., 6 (4): 468-486 (1984)k-NN as an implementation of situation testing for discrimination discovery and prevention., , and . KDD, page 502-510. ACM, (2011)Composing General Logic Programs., , and . LPNMR, volume 1265 of Lecture Notes in Computer Science, page 274-289. Springer, (1997)Enhancing GISs for spatio-temporal reasoning., , and . ACM-GIS, page 42-48. ACM, (2002)