Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Methods to Measure Importance of Data Attributes to Consumers of Information Products., , and . AMCIS, page 582. Association for Information Systems, (2010)ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection., , , and . SIGMOD Rec., 30 (4): 15-24 (2001)A method for entity identification in open source documents with partially redacted attributes, , , , , , , and . J. Comput. Small Coll., 22 (5): 138--144 (2007)Enhancing Profiles for Anomaly Detection Using Time Granularities., , , and . J. Comput. Secur., 10 (1/2): 137-158 (2002)Iterative Approach to Weight Calculation in Probabilistic Entity Resolution., , , and . ICIQ, MIT Information Quality Program, (2014)Identification of initial rotor position of a micro-PMSM., and . ICARCV, page 476-481. IEEE, (2008)A Case Study on Data Quality, Privacy, and Evaluating the Outcome of Entity Resolution Processes., , , , , and . Int. J. Organ. Collect. Intell., 6 (3): 1-20 (2016)Profiling Essential Professional Skills of Chief Data Officers Through Topical Modeling Algorithms., and . AMCIS, Association for Information Systems, (2017)How Consistent is Web Information - A Case Study on Online Real Estate Databases., , and . AMCIS, page 437. Association for Information Systems, (2009)An Information Theoretic Approach to Information Quality Metric., , , and . ICIQ, page 133-145. MIT, (2006)