From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Injecting purpose and trust into data anonymisation., , и . CIKM, стр. 1541-1544. ACM, (2009)Finding Dependent Test Items: An Information Theory Based Approach.. EDM, стр. 222-223. www.educationaldatamining.org, (2012)Trading Off Solution Quality for Faster Computation in DCOP Search Algorithms., , и . IJCAI, стр. 354-360. (2009)Comparing real-time and incremental heuristic search for real-time situated agents., и . Auton. Agents Multi Agent Syst., 18 (3): 313-341 (2009)An efficient hash-based algorithm for minimal k-anonymity., , , и . ACSC, том 74 из CRPIT, стр. 101-107. Australian Computer Society, (2008)L-Diversity Based Dynamic Update for Large Time-Evolving Microdata., , и . Australasian Conference on Artificial Intelligence, том 5360 из Lecture Notes in Computer Science, стр. 461-469. Springer, (2008)Priority Driven K-Anonymisation for Privacy Protection., , и . AusDM, том 87 из CRPIT, стр. 73-78. Australian Computer Society, (2008)Core Stability of Flow Games., и . CJCDGCGT, том 4381 из Lecture Notes in Computer Science, стр. 189-199. Springer, (2005)The Fringe-Saving A* Search Algorithm - A Feasibility Study., и . IJCAI, стр. 2391-2397. (2007)Generalized Fringe-Retrieving A*: faster moving target search on state lattices., , и . AAMAS, стр. 1081-1088. IFAAMAS, (2010)