Author of the publication

The (not so) Critical Nodes of Criminal Networks.

, , and . SocInfo Workshops, volume 8852 of Lecture Notes in Computer Science, page 87-96. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Engineering Color Barcode Algorithms for Mobile Applications., , and . SEA, volume 8504 of Lecture Notes in Computer Science, page 211-222. Springer, (2014)Resolving duplicates in Large Multiple-Choice Questions Repositories., , , , , and . IRCDL, volume 3643 of CEUR Workshop Proceedings, page 34-40. CEUR-WS.org, (2024)Fast Enumeration of Large k-Plexes., , , , and . KDD, page 115-124. ACM, (2017)Crowdsourcing for Building Knowledge Graphs at Scale from the Vatican Archives., , , , and . SEBD, volume 2646 of CEUR Workshop Proceedings, page 242-249. CEUR-WS.org, (2020)In Codice Ratio: A crowd-enabled solution for low resource machine transcription of the Vatican Registers., , , and . Inf. Process. Manag., 58 (5): 102606 (2021)Effective Explanations for Entity Resolution Models., , , , , and . ICDE, page 2709-2721. IEEE, (2022)Managing Large Multiple-choice Test Items Repositories., , , , and . IV, page 275-279. IEEE, (2022)Real-time analysis of critical nodes in network cores., , and . IWCMC, page 42-46. IEEE, (2012)Real-Time Monitoring of Undirected Networks: Articulation Points, Bridges, and Connected and Biconnected Components, , and . CoRR, (2012)The (not so) Critical Nodes of Criminal Networks., , and . SocInfo Workshops, volume 8852 of Lecture Notes in Computer Science, page 87-96. Springer, (2014)