Author of the publication

Approach to Supporting Continuity of Usage in Location-Based Access Control.

, , and . FTDCS, page 199-205. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preventing velocity-based linkage attacks in location-aware applications., , , and . GIS, page 246-255. ACM, (2009)Mining condensed spatial co-location patterns., , , , and . MobiGIS, page 84-87. ACM, (2015)Distributed approximate mining of frequent patterns., and . SAC, page 529-536. ACM, (2005)Trajectory Data Warehouses: Design Issues and Use Cases., , , , and . SEBD, page 208-219. (2007)Mobility and Uncertainty., and . Mobility Data, Cambridge University Press, (2013)Distributed and stream data mining algorithms for frequent pattern discovery.. Ca' Foscari University of Venice, Italy, (2006)Trajectory Data Warehouses: Design and Implementation Issues., , , , and . J. Comput. Sci. Eng., 1 (2): 211-232 (2007)Mining Frequent Closed Itemsets from Distributed Repositories., , , and . Knowledge and Data Management in GRIDs, page 221-234. Springer, (2005)GPU-Based Computing of Repeated Range Queries over Moving Objects., , , and . PDP, page 640-647. IEEE Computer Society, (2014)Predicting Fishing Effort and Catch Using Semantic Trajectories and Machine Learning., , , , , , , and . MASTER@PKDD/ECML, volume 11889 of Lecture Notes in Computer Science, page 83-99. Springer, (2019)