Your selections:
VICUS - A noise addition technique for categorical data
- Giggins, Helen, Brankovic, Ljiljana
Upper domination: complexity and approximation
- Bazgan, Cristina, Brankovic, Ljiljana, Casel, Katrin, Fernau, Henning, Jansen, Klaus, Klein, Kim-Manuel, Lampis, Michael, Liedloff, Mathieu, Monnot, Jérôme, Paschos, Vangelis Th.
Triangle randomization for social network data anonymization
- Brankovic, Ljiljana, Lopez, Nacho, Miller, Mirka, Sebe, Francesc
- London, Kerry A., Singh, Vishal, Gu, Ning, Taylor, Claudelle, Brankovic, Ljiljana
The many facets of upper domination
- Bazgan, Cristina, Brankovic, Ljiljana, Casel, Katrin, Fernau, Henning, Jansen, Klaus, Klein, Kim-Manuel, Lampis, Michael, Liedloff, Mathieu, Monnot, Jérôme, Paschos, Vangelis Th.
Teaching mathematical reasoning: from textbooks to software
- Brankovic, Ljiljana, Muir, Alexander, Giggins, Helen
Teaching advanced computing technologies to managers, engineers and other professionals
- Brankovic, Ljiljana, Chalup, Stephan, Wallis, Mark
Statistical disclosure control: to trust or not to trust
- Giggins, Helen, Brankovic, Ljiljana
- Brankovic, Ljiljana, Giggins, Helen
Special collection: security (editorial)
- Brankovic, Ljiljana, Miller, Mirka, Steketee, Chris
Special collection: privacy (editorial)
- Brankovic, Ljiljana, Miller, Mirka, Steketee, Chris
- Aljamea, Moudhi M., Brankovic, Ljiljana, Gao, Jia, Iliopoulos, Costas S., Samiruzzaman, M.
Reflection and guided problem-based learning in software engineering
- Brankovic, Ljiljana, Ye, Huilin, Reynolds, Michael
Quantifying privacy: a novel entropy-based measure of disclosure risk
- Alfalayleh, Mousa, Brankovic, Ljiljana
Privacy-preserving data mining
- Brankovic, Ljiljana, Islam, Md. Zahidul, Giggins, Helen
Privacy preserving data mining: a noise addition framework using a novel clustering technique
- Islam, Md Zahidul, Brankovic, Ljiljana
Premature partial Latin squares
- Brankovic, Ljiljana, Horak, Peter, Miller, Mirka, Rosa, Alexander
- King, Tatiana, Brankovic, Ljiljana, Gillard, Patricia
Parameterized approximation algorithms for HITTING SET
- Brankovic, Ljiljana, Fernau, Henning
On the linearity of cryptographic sequence generators
- Fuster-Sabater, Amparo, Delgado-Mohatar, Oscar, Brankovic, Ljiljana
Are you sure you would like to clear your session, including search history and login status?