Author of the publication

Achieving P-Sensitive K-Anonymity via Anatomy.

, , , and . ICEBE, page 199-205. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Injecting purpose and trust into data anonymisation., , and . CIKM, page 1541-1544. ACM, (2009)Finding Dependent Test Items: An Information Theory Based Approach.. EDM, page 222-223. www.educationaldatamining.org, (2012)Comparing real-time and incremental heuristic search for real-time situated agents., and . Auton. Agents Multi Agent Syst., 18 (3): 313-341 (2009)An efficient hash-based algorithm for minimal k-anonymity., , , and . ACSC, volume 74 of CRPIT, page 101-107. Australian Computer Society, (2008)Trading Off Solution Quality for Faster Computation in DCOP Search Algorithms., , and . IJCAI, page 354-360. (2009)Generalized Fringe-Retrieving A*: faster moving target search on state lattices., , and . AAMAS, page 1081-1088. IFAAMAS, (2010)Towards Identify Anonymization in Large Survey Rating Data., and . NSS, page 99-104. IEEE Computer Society, (2010)The Fringe-Saving A* Search Algorithm - A Feasibility Study., and . IJCAI, page 2391-2397. (2007)Core Stability of Flow Games., and . CJCDGCGT, volume 4381 of Lecture Notes in Computer Science, page 189-199. Springer, (2005)L-Diversity Based Dynamic Update for Large Time-Evolving Microdata., , and . Australasian Conference on Artificial Intelligence, volume 5360 of Lecture Notes in Computer Science, page 461-469. Springer, (2008)