Author of the publication

A Multi-Scale Approach to Data-Driven Mass Migration Analysis.

, , , , , , , , , and . SoGood@ECML-PKDD, volume 1831 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FPVI: A scalable method for discovering privacy vulnerabilities in microdata., , and . ISC2, page 1-8. IEEE, (2016)Answering queries using pairings., , and . CoRR, (2014)Contingent versus Deterministic Plans in Multi-Modal Journey Planning., and . ICAPS, page 268-272. AAAI Press, (2015)The zen of multidisciplinary team recommendation, , and . Journal of the Association for Information Science and Technology, 65 (12): 2518--2533 (2014)Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption., , and . NordSec, volume 8788 of Lecture Notes in Computer Science, page 94-109. Springer, (2014)Anatomy and Deployment of Robust AI-Centric Indoor Positioning System., and . PerCom Workshops, page 340-342. IEEE, (2019)Combining access control and trust negotiations in an On-line Social Network., , and . CollaborateCom, page 1-10. ICST / IEEE, (2010)Multidimensional Reputation Network for Service Composition in the Internet of Things., , and . IEEE SCC, page 685-692. IEEE Computer Society, (2014)PRIMA: An End-to-End Framework for Privacy at Scale., , , , and . ICDE, page 1531-1542. IEEE Computer Society, (2018)Managing travels with PETRA: The Rome use case., , , , and . ICDE Workshops, page 110-111. IEEE Computer Society, (2015)