Z. Li, S. Lu, S. Myagmar, and Y. Zhou. Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6, page 20--20. Berkeley, CA, USA, USENIX Association, (2004)
F. Lemmerich, and M. Atzmueller. Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom), page 1356 -1363. (2011)
G. Ammons, R. Bod\'ık, and J. Larus. Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, page 4--16. New York, NY, USA, ACM, (2002)
F. Lemmerich, and M. Atzmueller. Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom), page 1356 -1363. (2011)
F. Lemmerich, M. Becker, and M. Atzmueller. Proc. ECML/PKDD 2012: European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, Heidelberg, Germany, Springer Verlag, (2012)
M. Atzmueller, and F. Lemmerich. Proc. ECML/PKDD 2012: European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, Heidelberg, Germany, Springer Verlag, (2012)
F. Lemmerich, and M. Atzmueller. Proc. IEEE Third International Conference on Social Computing (SocialCom), page 1356--1363. Boston, MA, USA, IEEE Computer Society, (2011)
J. Llinas, C. Bowman, G. Rogova, A. Steinberg, and F. White. In P. Svensson and J. Schubert (Eds.), Proceedings of the Seventh International Conference on Information Fusion (FUSION 2004, page 1218--1230. (2004)
J. Paakki, A. Karhinen, J. Gustafsson, L. Nenonen, and A. Verkamo. Proceedings of the International Conference on Software: Theory and Practice (16th IFIP World Computer Congress), page 325--332. Beijing, China, (2000)