Author of the publication

PrivacyPalisade: Evaluating app permissions and building privacy into smartphones.

, , , , and . ICICS, page 1-5. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Continuous Detour Queries in Spatial Networks., , , , and . IEEE Trans. Knowl. Data Eng., 24 (7): 1201-1215 (2012)A Superimposed Coding Scheme Based on Multiple Block Descriptor Files for Indexing Very Large Data Bases., , and . VLDB, page 351-359. Morgan Kaufmann, (1988)The Effect of Weighted Term Frequencies on Probabilistic Latent Semantic Term Relationships., and . SPIRE, volume 5280 of Lecture Notes in Computer Science, page 63-74. Springer, (2008)Error Correcting Output Coding-Based Conditional Random Fields for Web Page Prediction., , and . Web Intelligence, page 743-746. IEEE Computer Society, (2008)Internet Document Filtering Using Fourier Domain Scoring., , and . PKDD, volume 2168 of Lecture Notes in Computer Science, page 362-373. Springer, (2001)Efficient storage and retrieval of probabilistic latent semantic information for information retrieval., and . VLDB J., 18 (1): 141-155 (2009)A Novel Document Ranking Method Using the Discrete Cosine Transform., , and . IEEE Trans. Pattern Anal. Mach. Intell., 27 (1): 130-135 (2005)Fault-tolerant Workflow Scheduling using Spot Instances on Clouds., , and . ICCS, volume 29 of Procedia Computer Science, page 523-533. Elsevier, (2014)A Stream AND-Parallel Execution Algorithm with Backtracking., , and . ICLP/SLP, page 1142-1159. MIT Press, (1988)Lossy Bulk Synchronous Parallel Processing Model for Very Large Scale Grids, , and . CoRR, (2006)