Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Ljiljana Brankovic
2010 – today
- 2012
[j13]Tatiana King, Ljiljana Brankovic, Patricia Gillard: Perspectives of Australian adults about protecting the privacy of their health information in statistical databases. I. J. Medical Informatics 81(4): 279-289 (2012)- 2011
[j12]Daniel Binkele-Raible, Ljiljana Brankovic, Marek Cygan, Henning Fernau, Joachim Kneis, Dieter Kratsch, Alexander Langer, Mathieu Liedloff, Marcin Pilipczuk, Peter Rossmanith, Jakub Onufry Wojtaszczyk: Breaking the 2n-barrier for Irredundance: Two lines of attack. J. Discrete Algorithms 9(3): 214-230 (2011)
[j11]Md. Zahidul Islam, Ljiljana Brankovic: Privacy preserving data mining: A noise addition framework using a novel clustering technique. Knowl.-Based Syst. 24(8): 1214-1223 (2011)
[j10]Ljiljana Brankovic, Ian M. Wanless: Graceful Labelling: State of the Art, Applications and Future Directions. Mathematics in Computer Science 5(1): 11-20 (2011)
[j9]Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin Lin, Wenjie Zhang, Wei Wang: Continuous Monitoring of Distance-Based Range Queries. IEEE Trans. Knowl. Data Eng. 23(8): 1182-1199 (2011)
[c11]Ljiljana Brankovic, Henning Fernau: Parameterized Approximation Algorithms for Hitting Set. WAOA 2011: 63-76- 2010
[c10]Daniel Binkele-Raible, Ljiljana Brankovic, Henning Fernau, Joachim Kneis, Dieter Kratsch, Alexander Langer, Mathieu Liedloff, Peter Rossmanith: A Parameterized Route to Exact Puzzles: Breaking the 2n-Barrier for Irredundance. CIAC 2010: 311-322
[c9]Amparo Fúster-Sabater, Oscar Delgado-Mohatar, Ljiljana Brankovic: On the Linearity of Cryptographic Sequence Generators. ICCSA (2) 2010: 586-596
[c8]Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin Lin, Wenjie Zhang, Wei Wang: Multi-guarded safe zone: An effective technique to monitor moving circular range queries. ICDE 2010: 189-200
[c7]Ljiljana Brankovic, Henning Fernau: Combining Two Worlds: Parameterised Approximation for Vertex Cover. ISAAC (1) 2010: 390-402
[c6]Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, Amparo Fúster-Sabater: An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks. WISTP 2010: 332-339
2000 – 2009
- 2009
[i1]Ljiljana Brankovic, Henning Fernau, Joachim Kneis, Dieter Kratsch, Alexander Langer, Mathieu Liedloff, Daniel Raible, Peter Rossmanith: Breaking the 2^n-Barrier for Irredundance: A Parameterized Route to Solving Exact Puzzles. CoRR abs/0909.4224 (2009)- 2008
[j8]Ljiljana Brankovic, Mirka Miller, Chris Steketee: Guest Editorial. Journal of Research and Practice in Information Technology 40(3): 149 (2008)
[j7]Ljiljana Brankovic, Mirka Miller, Chris Steketee: Guest Editorial. Journal of Research and Practice in Information Technology 40(4): 229 (2008)- 2007
[e1]Ljiljana Brankovic, Paul D. Coddington, John F. Roddick, Chris Steketee, James R. Warren, Andrew L. Wendelborn (Eds.): ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30 - February 2, 2007. CRPIT 68, Australian Computer Society 2007, ISBN 1-920-68249-X- 2004
[c5]Md. Zahidul Islam, Ljiljana Brankovic: A Framework for Privacy Preserving Classification in Data Mining. ACSW Frontiers 2004: 163-168- 2002
[j6]Ljiljana Brankovic, Peter Horák, Mirka Miller, Alexander Rosa: Premature partial latin squares. Ars Comb. 63 (2002)
[j5]Ljiljana Brankovic, Mirka Miller, Jozef Sirán: On Range Query Usability of Statistical Databases. Int. J. Comput. Math. 79(12): 1265-1271 (2002)
[c4]Ljiljana Brankovic, Jozef Sirán: 2-Compromise Usability in 1-Dimensional Statistical Databases. COCOON 2002: 448-455- 2000
[j4]Ljiljana Brankovic, Peter Horák, Mirka Miller: An Optimization Problem in Statistical Databases. SIAM J. Discrete Math. 13(3): 346-353 (2000)
1990 – 1999
- 1999
[j3]Ljiljana Brankovic, Paulette Lieby, Mirka Miller: Flattening Antichains with Respect to the Volume. Electr. J. Comb. 6 (1999)
[j2]Peter Horák, Ljiljana Brankovic, Mirka Miller: A Combinatorial Problem in Database Security. Discrete Applied Mathematics 91(1-3): 119-126 (1999)
[c3]Vladimir Estivill-Castro, Ljiljana Brankovic: Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules. DaWaK 1999: 389-398- 1998
[j1]Ljiljana Brankovic, Mirka Miller, Ján Plesník, Joseph F. Ryan, Jozef Sirán: A Note on Constructing Large Cayley Graphs of Given Degree and Diameter by Voltage Assignments. Electr. J. Comb. 5 (1998)- 1997
[c2]Ljiljana Brankovic, Peter Horák, Mirka Miller, Graham Wrightson: Usability of Compromise-Free Statistical Databases. SSDBM 1997: 144-154- 1996
[c1]Ljiljana Brankovic, Mirka Miller, Jozef Sirán: Towards a Practical Auditing Method for the Prevention of Statistical Database Compromise. Australasian Database Conference 1996: 177-184
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:09 CEST by the dblp team



