Author of the publication

Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime.

, , , , , , and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 171-182. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lazy Evaluation of Symmetric Bayesian Decision Problems, and . CoRR, (2013)An Empirical Evaluation of Possible Variations of Lazy Propagation. CoRR, (2012)Lazy Propagation in Junction Trees, and . CoRR, (2013)Hugin - The Tool for Bayesian Networks and Influence Diagrams., , , and . Probabilistic Graphical Models, (2002)The Hugin Tool for Probabilistic Graphical Models., , , and . Int. J. Artif. Intell. Tools, 14 (3): 507-544 (2005)Ordering arc-reversal operations when eliminating variables in lazy AR propagation., and . Int. J. Approx. Reason., 54 (8): 1182-1196 (2013)Stateful to Stateless: Modelling Stateless Ethereum., , , and . MARS@ETAPS, volume 355 of EPTCS, page 27-39. (2022)Prediction of High Risk of Deviations in Home Care Deliveries., , , , , , , and . PGM, volume 138 of Proceedings of Machine Learning Research, page 281-292. PMLR, (2020)Approximate Lazy Evaluation of Influence Diagrams., , , and . CAEPIA, volume 8109 of Lecture Notes in Computer Science, page 321-331. Springer, (2013)A component framework as an enabler for industrial cyber physical systems., , , , , , and . ICPS, page 339-344. IEEE, (2018)