Author of the publication

Priority Driven K-Anonymisation for Privacy Protection.

, , and . AusDM, volume 87 of CRPIT, page 73-78. Australian Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trading Off Solution Quality for Faster Computation in DCOP Search Algorithms., , and . IJCAI, page 354-360. (2009)Comparing real-time and incremental heuristic search for real-time situated agents., and . Auton. Agents Multi Agent Syst., 18 (3): 313-341 (2009)Injecting purpose and trust into data anonymisation., , and . CIKM, page 1541-1544. ACM, (2009)Finding Dependent Test Items: An Information Theory Based Approach.. EDM, page 222-223. www.educationaldatamining.org, (2012)An efficient hash-based algorithm for minimal k-anonymity., , , and . ACSC, volume 74 of CRPIT, page 101-107. Australian Computer Society, (2008)Generalized Fringe-Retrieving A*: faster moving target search on state lattices., , and . AAMAS, page 1081-1088. IFAAMAS, (2010)The Fringe-Saving A* Search Algorithm - A Feasibility Study., and . IJCAI, page 2391-2397. (2007)Towards Identify Anonymization in Large Survey Rating Data., and . NSS, page 99-104. IEEE Computer Society, (2010)Core Stability of Flow Games., and . CJCDGCGT, volume 4381 of Lecture Notes in Computer Science, page 189-199. Springer, (2005)L-Diversity Based Dynamic Update for Large Time-Evolving Microdata., , and . Australasian Conference on Artificial Intelligence, volume 5360 of Lecture Notes in Computer Science, page 461-469. Springer, (2008)