From post

Privacy-Aware Access Control through Negotiation in Daily Life Service.

, , и . ISI Workshops, том 5075 из Lecture Notes in Computer Science, стр. 514-519. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Artificial image objects for classification of schizophrenia with GWAS-selected SNVs and convolutional neural network., , , , , и . Patterns, 2 (8): 100303 (2021)Robust Multimodal Heartbeat Detection Using Hybrid Neural Networks., , , , и . IEEE Access, (2020)Beyond Cumulative Sum Charting in Non-Stationarity Detection and Estimation., , , , , , , , и . IEEE Access, (2019)A course module on web tracking and privacy., , , , и . InfoSecCD, стр. 10:1-10:7. ACM, (2015)Deep Learning for Link Prediction in Dynamic Networks Using Weak Estimators., и . IEEE Access, (2018)Optimized Label Propagation Community Detection on Big Data Networks., и . ICBDE, стр. 57-62. ACM, (2018)Importance of Data Standardization in Privacy-Preserving K-Means Clustering., , и . DASFAA Workshops, том 5667 из Lecture Notes in Computer Science, стр. 276-286. Springer, (2009)An artificial immune system for phishing detection., , , , и . IEEE Congress on Evolutionary Computation, стр. 1-7. IEEE, (2012)SUCH: A Cloud Computing Management Tool., , и . NTMS, стр. 1-4. IEEE, (2012)Effective Mutation and Recombination for Evolving Convolutional Networks., и . APPIS, стр. 3:1-3:6. ACM, (2020)