Can you Really Anonymize the Donors of Genomic Data in Today’s Digital World? View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2016

AUTHORS

Mohammed Alser , Nour Almadhoun , Azita Nouri , Can Alkan , Erman Ayday

ABSTRACT

The rapid progress in genome sequencing technologies leads to availability of high amounts of genomic data. Accelerating the pace of biomedical breakthroughs and discoveries necessitates not only collecting millions of genetic samples but also granting open access to genetic databases. However, one growing concern is the ability to protect the privacy of sensitive information and its owner. In this work, we survey a wide spectrum of cross-layer privacy breaching strategies to human genomic data (using both public genomic databases and other public non-genomic data). We outline the principles and outcomes of each technique, and assess its technological complexity and maturation. We then review potential privacy-preserving countermeasure mechanisms for each threat. More... »

PAGES

237-244

Book

TITLE

Data Privacy Management, and Security Assurance

ISBN

978-3-319-29882-5
978-3-319-29883-2

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-29883-2_16

DOI

http://dx.doi.org/10.1007/978-3-319-29883-2_16

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1012729734


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0604", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Genetics", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/06", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Biological Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Bilkent University", 
          "id": "https://www.grid.ac/institutes/grid.18376.3b", 
          "name": [
            "Computer Engineering Department, Bilkent University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Alser", 
        "givenName": "Mohammed", 
        "id": "sg:person.010060123117.95", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010060123117.95"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Bilkent University", 
          "id": "https://www.grid.ac/institutes/grid.18376.3b", 
          "name": [
            "Computer Engineering Department, Bilkent University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Almadhoun", 
        "givenName": "Nour", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Bilkent University", 
          "id": "https://www.grid.ac/institutes/grid.18376.3b", 
          "name": [
            "Computer Engineering Department, Bilkent University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Nouri", 
        "givenName": "Azita", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Bilkent University", 
          "id": "https://www.grid.ac/institutes/grid.18376.3b", 
          "name": [
            "Computer Engineering Department, Bilkent University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Alkan", 
        "givenName": "Can", 
        "id": "sg:person.0737070412.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0737070412.26"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Bilkent University", 
          "id": "https://www.grid.ac/institutes/grid.18376.3b", 
          "name": [
            "Computer Engineering Department, Bilkent University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ayday", 
        "givenName": "Erman", 
        "id": "sg:person.010127300721.85", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010127300721.85"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/2767007", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1003355152"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2508859.2516707", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1007667874"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1371/journal.pgen.1000167", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1013666372"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1126/science.1229566", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1015829888"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s10561-009-9166-8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1016224127", 
          "https://doi.org/10.1007/s10561-009-9166-8"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-54568-9_9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1017707706", 
          "https://doi.org/10.1007/978-3-642-54568-9_9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1038/ng.2248", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1022411427", 
          "https://doi.org/10.1038/ng.2248"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1038/nrg3723", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1023173235", 
          "https://doi.org/10.1038/nrg3723"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1093/nar/gku1241", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1023289025"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00439-009-0771-1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1027046407", 
          "https://doi.org/10.1007/s00439-009-0771-1"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00439-009-0771-1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1027046407", 
          "https://doi.org/10.1007/s00439-009-0771-1"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00439-009-0771-1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1027046407", 
          "https://doi.org/10.1007/s00439-009-0771-1"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00439-009-0771-1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1027046407", 
          "https://doi.org/10.1007/s00439-009-0771-1"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2046707.2046785", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1029264459"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1038/ejhg.2008.198", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1031280080", 
          "https://doi.org/10.1038/ejhg.2008.198"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2517840.2517843", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033451525"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s12687-014-0191-3", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033834236", 
          "https://doi.org/10.1007/s12687-014-0191-3"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1038/nature13908", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1046951438", 
          "https://doi.org/10.1038/nature13908"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1038/nrg2952", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1048500546", 
          "https://doi.org/10.1038/nrg2952"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1142/s0218488502001648", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1062976751"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2016", 
    "datePublishedReg": "2016-01-01", 
    "description": "The rapid progress in genome sequencing technologies leads to availability of high amounts of genomic data. Accelerating the pace of biomedical breakthroughs and discoveries necessitates not only collecting millions of genetic samples but also granting open access to genetic databases. However, one growing concern is the ability to protect the privacy of sensitive information and its owner. In this work, we survey a wide spectrum of cross-layer privacy breaching strategies to human genomic data (using both public genomic databases and other public non-genomic data). We outline the principles and outcomes of each technique, and assess its technological complexity and maturation. We then review potential privacy-preserving countermeasure mechanisms for each threat.", 
    "editor": [
      {
        "familyName": "Garcia-Alfaro", 
        "givenName": "Joaquin", 
        "type": "Person"
      }, 
      {
        "familyName": "Navarro-Arribas", 
        "givenName": "Guillermo", 
        "type": "Person"
      }, 
      {
        "familyName": "Aldini", 
        "givenName": "Alessandro", 
        "type": "Person"
      }, 
      {
        "familyName": "Martinelli", 
        "givenName": "Fabio", 
        "type": "Person"
      }, 
      {
        "familyName": "Suri", 
        "givenName": "Neeraj", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-29883-2_16", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-319-29882-5", 
        "978-3-319-29883-2"
      ], 
      "name": "Data Privacy Management, and Security Assurance", 
      "type": "Book"
    }, 
    "name": "Can you Really Anonymize the Donors of Genomic Data in Today\u2019s Digital World?", 
    "pagination": "237-244", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-29883-2_16"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "3ca454dd41d48af30d5d9eab130c32510cf8e0c258a4c14c5dd79fe623b11a9a"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1012729734"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-29883-2_16", 
      "https://app.dimensions.ai/details/publication/pub.1012729734"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T21:57", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8693_00000251.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-29883-2_16"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-29883-2_16'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-29883-2_16'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-29883-2_16'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-29883-2_16'


 

This table displays all metadata directly associated to this object as RDF triples.

171 TRIPLES      23 PREDICATES      44 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-29883-2_16 schema:about anzsrc-for:06
2 anzsrc-for:0604
3 schema:author Nd8d3e0f8ec2a4aacbb99bc1d2a730a0c
4 schema:citation sg:pub.10.1007/978-3-642-54568-9_9
5 sg:pub.10.1007/s00439-009-0771-1
6 sg:pub.10.1007/s10561-009-9166-8
7 sg:pub.10.1007/s12687-014-0191-3
8 sg:pub.10.1038/ejhg.2008.198
9 sg:pub.10.1038/nature13908
10 sg:pub.10.1038/ng.2248
11 sg:pub.10.1038/nrg2952
12 sg:pub.10.1038/nrg3723
13 https://doi.org/10.1093/nar/gku1241
14 https://doi.org/10.1126/science.1229566
15 https://doi.org/10.1142/s0218488502001648
16 https://doi.org/10.1145/2046707.2046785
17 https://doi.org/10.1145/2508859.2516707
18 https://doi.org/10.1145/2517840.2517843
19 https://doi.org/10.1145/2767007
20 https://doi.org/10.1371/journal.pgen.1000167
21 schema:datePublished 2016
22 schema:datePublishedReg 2016-01-01
23 schema:description The rapid progress in genome sequencing technologies leads to availability of high amounts of genomic data. Accelerating the pace of biomedical breakthroughs and discoveries necessitates not only collecting millions of genetic samples but also granting open access to genetic databases. However, one growing concern is the ability to protect the privacy of sensitive information and its owner. In this work, we survey a wide spectrum of cross-layer privacy breaching strategies to human genomic data (using both public genomic databases and other public non-genomic data). We outline the principles and outcomes of each technique, and assess its technological complexity and maturation. We then review potential privacy-preserving countermeasure mechanisms for each threat.
24 schema:editor N0e7a6e2d93de48f4b58efa71bde65cae
25 schema:genre chapter
26 schema:inLanguage en
27 schema:isAccessibleForFree true
28 schema:isPartOf N96e80bc9c5b0497caef5600244523534
29 schema:name Can you Really Anonymize the Donors of Genomic Data in Today’s Digital World?
30 schema:pagination 237-244
31 schema:productId N485de4eba873491b9cf52dff71dc65bf
32 N7d23c2d626354d4884738e91ac9f7f2f
33 Nf5335da89bc1492abc934ff4bbc82d87
34 schema:publisher Nf6f7cf4bd4b049aeb8f81cb14b85ee42
35 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012729734
36 https://doi.org/10.1007/978-3-319-29883-2_16
37 schema:sdDatePublished 2019-04-15T21:57
38 schema:sdLicense https://scigraph.springernature.com/explorer/license/
39 schema:sdPublisher Nd82fe0fa8dc14233a7b7c1b8f9de776b
40 schema:url http://link.springer.com/10.1007/978-3-319-29883-2_16
41 sgo:license sg:explorer/license/
42 sgo:sdDataset chapters
43 rdf:type schema:Chapter
44 N031f3775aabc4fbebd7ad0f64031c2ec rdf:first Nec75715af1b542dba893804f9c56f4a5
45 rdf:rest N707dffb1d56549b6adf4d89414a9fb8d
46 N0c9ca2b6e52c402c8c777bbf5cf97f7a schema:familyName Suri
47 schema:givenName Neeraj
48 rdf:type schema:Person
49 N0e7a6e2d93de48f4b58efa71bde65cae rdf:first N974e1318569946458b367e687c7bc6cf
50 rdf:rest Ncc518d25be904b8f894c8e3de9007230
51 N485de4eba873491b9cf52dff71dc65bf schema:name readcube_id
52 schema:value 3ca454dd41d48af30d5d9eab130c32510cf8e0c258a4c14c5dd79fe623b11a9a
53 rdf:type schema:PropertyValue
54 N48c5c02debce44f0bede08a868f98a16 rdf:first Necb72d662c2b490cb7fbc5581b971afb
55 rdf:rest N031f3775aabc4fbebd7ad0f64031c2ec
56 N4bbfb217cb3a4424b29500f2b1c95b78 rdf:first N0c9ca2b6e52c402c8c777bbf5cf97f7a
57 rdf:rest rdf:nil
58 N621ff8b2aa9d449a9631ae1445ac3c85 rdf:first sg:person.010127300721.85
59 rdf:rest rdf:nil
60 N707dffb1d56549b6adf4d89414a9fb8d rdf:first sg:person.0737070412.26
61 rdf:rest N621ff8b2aa9d449a9631ae1445ac3c85
62 N715fa8a826584bdcab66d5e5839ffe14 schema:familyName Aldini
63 schema:givenName Alessandro
64 rdf:type schema:Person
65 N7d23c2d626354d4884738e91ac9f7f2f schema:name doi
66 schema:value 10.1007/978-3-319-29883-2_16
67 rdf:type schema:PropertyValue
68 N8952fc9989ac471a9ec0150a6e3d4da3 schema:familyName Navarro-Arribas
69 schema:givenName Guillermo
70 rdf:type schema:Person
71 N96e80bc9c5b0497caef5600244523534 schema:isbn 978-3-319-29882-5
72 978-3-319-29883-2
73 schema:name Data Privacy Management, and Security Assurance
74 rdf:type schema:Book
75 N974e1318569946458b367e687c7bc6cf schema:familyName Garcia-Alfaro
76 schema:givenName Joaquin
77 rdf:type schema:Person
78 Nc3abc808149645949a14334b3fb66510 rdf:first Nd5b50e572cf14650acbfbd91130ab488
79 rdf:rest N4bbfb217cb3a4424b29500f2b1c95b78
80 Ncc518d25be904b8f894c8e3de9007230 rdf:first N8952fc9989ac471a9ec0150a6e3d4da3
81 rdf:rest Nfda84585f010486b8c5d4bc1714778f3
82 Nd5b50e572cf14650acbfbd91130ab488 schema:familyName Martinelli
83 schema:givenName Fabio
84 rdf:type schema:Person
85 Nd82fe0fa8dc14233a7b7c1b8f9de776b schema:name Springer Nature - SN SciGraph project
86 rdf:type schema:Organization
87 Nd8d3e0f8ec2a4aacbb99bc1d2a730a0c rdf:first sg:person.010060123117.95
88 rdf:rest N48c5c02debce44f0bede08a868f98a16
89 Nec75715af1b542dba893804f9c56f4a5 schema:affiliation https://www.grid.ac/institutes/grid.18376.3b
90 schema:familyName Nouri
91 schema:givenName Azita
92 rdf:type schema:Person
93 Necb72d662c2b490cb7fbc5581b971afb schema:affiliation https://www.grid.ac/institutes/grid.18376.3b
94 schema:familyName Almadhoun
95 schema:givenName Nour
96 rdf:type schema:Person
97 Nf5335da89bc1492abc934ff4bbc82d87 schema:name dimensions_id
98 schema:value pub.1012729734
99 rdf:type schema:PropertyValue
100 Nf6f7cf4bd4b049aeb8f81cb14b85ee42 schema:location Cham
101 schema:name Springer International Publishing
102 rdf:type schema:Organisation
103 Nfda84585f010486b8c5d4bc1714778f3 rdf:first N715fa8a826584bdcab66d5e5839ffe14
104 rdf:rest Nc3abc808149645949a14334b3fb66510
105 anzsrc-for:06 schema:inDefinedTermSet anzsrc-for:
106 schema:name Biological Sciences
107 rdf:type schema:DefinedTerm
108 anzsrc-for:0604 schema:inDefinedTermSet anzsrc-for:
109 schema:name Genetics
110 rdf:type schema:DefinedTerm
111 sg:person.010060123117.95 schema:affiliation https://www.grid.ac/institutes/grid.18376.3b
112 schema:familyName Alser
113 schema:givenName Mohammed
114 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010060123117.95
115 rdf:type schema:Person
116 sg:person.010127300721.85 schema:affiliation https://www.grid.ac/institutes/grid.18376.3b
117 schema:familyName Ayday
118 schema:givenName Erman
119 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010127300721.85
120 rdf:type schema:Person
121 sg:person.0737070412.26 schema:affiliation https://www.grid.ac/institutes/grid.18376.3b
122 schema:familyName Alkan
123 schema:givenName Can
124 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0737070412.26
125 rdf:type schema:Person
126 sg:pub.10.1007/978-3-642-54568-9_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017707706
127 https://doi.org/10.1007/978-3-642-54568-9_9
128 rdf:type schema:CreativeWork
129 sg:pub.10.1007/s00439-009-0771-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027046407
130 https://doi.org/10.1007/s00439-009-0771-1
131 rdf:type schema:CreativeWork
132 sg:pub.10.1007/s10561-009-9166-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016224127
133 https://doi.org/10.1007/s10561-009-9166-8
134 rdf:type schema:CreativeWork
135 sg:pub.10.1007/s12687-014-0191-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033834236
136 https://doi.org/10.1007/s12687-014-0191-3
137 rdf:type schema:CreativeWork
138 sg:pub.10.1038/ejhg.2008.198 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031280080
139 https://doi.org/10.1038/ejhg.2008.198
140 rdf:type schema:CreativeWork
141 sg:pub.10.1038/nature13908 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046951438
142 https://doi.org/10.1038/nature13908
143 rdf:type schema:CreativeWork
144 sg:pub.10.1038/ng.2248 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022411427
145 https://doi.org/10.1038/ng.2248
146 rdf:type schema:CreativeWork
147 sg:pub.10.1038/nrg2952 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048500546
148 https://doi.org/10.1038/nrg2952
149 rdf:type schema:CreativeWork
150 sg:pub.10.1038/nrg3723 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023173235
151 https://doi.org/10.1038/nrg3723
152 rdf:type schema:CreativeWork
153 https://doi.org/10.1093/nar/gku1241 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023289025
154 rdf:type schema:CreativeWork
155 https://doi.org/10.1126/science.1229566 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015829888
156 rdf:type schema:CreativeWork
157 https://doi.org/10.1142/s0218488502001648 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062976751
158 rdf:type schema:CreativeWork
159 https://doi.org/10.1145/2046707.2046785 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029264459
160 rdf:type schema:CreativeWork
161 https://doi.org/10.1145/2508859.2516707 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007667874
162 rdf:type schema:CreativeWork
163 https://doi.org/10.1145/2517840.2517843 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033451525
164 rdf:type schema:CreativeWork
165 https://doi.org/10.1145/2767007 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003355152
166 rdf:type schema:CreativeWork
167 https://doi.org/10.1371/journal.pgen.1000167 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013666372
168 rdf:type schema:CreativeWork
169 https://www.grid.ac/institutes/grid.18376.3b schema:alternateName Bilkent University
170 schema:name Computer Engineering Department, Bilkent University
171 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...