Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Global Explanations for Credit Risk Scoring., , and . CoRR, (2018)Speed up gradual rule mining from stream data! A B-Tree and OWA-based approach., , and . J. Intell. Inf. Syst., 35 (3): 447-463 (2010)Possibilistic reasoning for trust-based access control enforcement in social networks., and . FUZZ-IEEE, page 1-6. IEEE, (2010)Extending Microaggregation Procedures for Time Series Protection., and . RSCTC, volume 4259 of Lecture Notes in Computer Science, page 899-908. Springer, (2006)Citizens Sensor Networks., and . CitiSens, volume 7685 of Lecture Notes in Computer Science, page 1-5. Springer, (2012)Using Copies to Remove Sensitive Data: A Case Study on Fair Superhero Alignment Prediction., , and . IbPRIA (1), volume 11867 of Lecture Notes in Computer Science, page 182-193. Springer, (2019)On the Use of Social Trajectory-Based Clustering Methods for Public Transport Optimization., , and . CitiSens, volume 8313 of Lecture Notes in Computer Science, page 59-70. Springer, (2013)Computing Reputation for Collaborative Private Networks., , , and . COMPSAC (1), page 246-253. IEEE Computer Society, (2009)Tweet-SCAN: An event discovery technique for geo-located tweets., , , and . CCIA, volume 277 of Frontiers in Artificial Intelligence and Applications, page 110-119. IOS Press, (2015)Worker ranking determination in crowdsourcing platforms using aggregation functions., , , and . FUZZ-IEEE, page 1801-1808. IEEE, (2014)