The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shyam K. Gupta: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mukesh K. Mohania, Dhruv Swamini, Shyam Kumar Gupta, Sourav S. Bhowmick, Tharam S. Dillon
    Event Composition and Detection in Data Stream Management Systems. [Citation Graph (0, 0)][DBLP]
    DEXA, 2005, pp:756-765 [Conf]
  2. Sanjay Mittal, Rahul Gupta, Mukesh K. Mohania, Shyam K. Gupta, Mizuho Iwaihara, Tharam S. Dillon
    Detecting Frauds in Online Advertising Systems. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2006, pp:222-231 [Conf]
  3. Vikram Goyal, Shyam K. Gupta, Indira Meshram, Anand Gupta
    PRINDA: Architecture and Design of Non-Disclosure Agreements in Privacy Policy Framework. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2006, pp:90- [Conf]
  4. Shyam K. Gupta, Vikram Goyal, Anand Gupta
    Malafide Intension Based Detection of Privacy Violation in Information System. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:365-368 [Conf]
  5. Shyam K. Gupta, Vikram Goyal, Bholi Patra, Sankalp Dubey, Anand Gupta
    Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report). [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:369-372 [Conf]
  6. Vikram Goyal, Shyam K. Gupta, Anand Gupta
    Malafide Intension and its mapping to Privacy Policy Purposes for Masquerading. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2006, pp:311-312 [Conf]
  7. Hadrien Bullot, Shyam K. Gupta, Mukesh K. Mohania
    A Data-Mining Approach for Optimizing Performance of an Incremental Crawler. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2003, pp:610-615 [Conf]

  8. A Unified Audit Expression Model for Auditing SQL Queries. [Citation Graph (, )][DBLP]


  9. Query rewriting for detection of privacy violation through inferencing. [Citation Graph (, )][DBLP]


  10. Auditing Inference Based Disclosures in Dynamic Databases. [Citation Graph (, )][DBLP]


  11. A System to test malafide intension based on privacy violation detection. [Citation Graph (, )][DBLP]


  12. Precomputation of privacy policy parameters for auditing SQL queries. [Citation Graph (, )][DBLP]


  13. PRINDA: Architecture and design of non-disclosure agreements in privacy policy framework. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002