Author of the publication

Nearest Query on Distributed Binary Trees Starting from a Random Node.

, , , , and . KESW, volume 649 of Communications in Computer and Information Science, page 257-271. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining Syntactic and Semantic Vector Space Models in the Health Domain by using a Clustering Ensemble., , , , and . HEALTHINF, page 382-385. SciTePress, (2013)A Semantic Index for Linked Open Data and Big Data Applications.. University of Naples Federico II, Italy, (2017)base-search.net (ftunivnapoli:oai:fedoa.unina.it:11524).Multiple Classifier Systems: Theory, Applications and Tools., , and . Handbook on Neural Information Processing, volume 49 of Intelligent Systems Reference Library, Springer, (2013)An Analytical Approach for Optimal Resilience Management in Future ATM Systems., , , and . IDC, volume 616 of Studies in Computational Intelligence, page 415-425. Springer, (2015)Can Justice be a measurable value for AI? Proposed evaluation of the relationship between NLP models and principles of Justice., , and . HCAI4U@CHItaly, volume 3502 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Decision Tree-Based Multiple Classifier Systems: An FPGA Perspective., , , , and . MCS, volume 9132 of Lecture Notes in Computer Science, page 194-205. Springer, (2015)Multiple Classifier Systems for Image Forgery Detection., , , and . ICIAP (2), volume 8157 of Lecture Notes in Computer Science, page 259-268. Springer, (2013)A Multi-agent and Dynamic Programming Algorithm for Aeronautical Maintenance Planning., , and . 3PGCIC, page 410-415. IEEE, (2013)A Novel COVID-19 Data Set and an Effective Deep Learning Approach for the De-Identification of Italian Medical Records., , , , , and . IEEE Access, (2021)Identification of Traffic Flows Hiding behind TCP Port 80., , , , and . ICC, page 1-6. IEEE, (2010)