From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Copies to Remove Sensitive Data: A Case Study on Fair Superhero Alignment Prediction., , и . IbPRIA (1), том 11867 из Lecture Notes in Computer Science, стр. 182-193. Springer, (2019)Possibilistic reasoning for trust-based access control enforcement in social networks., и . FUZZ-IEEE, стр. 1-6. IEEE, (2010)Citizens Sensor Networks., и . CitiSens, том 7685 из Lecture Notes in Computer Science, стр. 1-5. Springer, (2012)On the Use of Social Trajectory-Based Clustering Methods for Public Transport Optimization., , и . CitiSens, том 8313 из Lecture Notes in Computer Science, стр. 59-70. Springer, (2013)Worker ranking determination in crowdsourcing platforms using aggregation functions., , , и . FUZZ-IEEE, стр. 1801-1808. IEEE, (2014)Energy-Efficiency and Security Issues in the Cisco Nexus Virtual Distributed Switching., , и . IMIS, стр. 552-557. IEEE Computer Society, (2012)Tweet-SCAN: An event discovery technique for geo-located tweets., , , и . CCIA, том 277 из Frontiers in Artificial Intelligence and Applications, стр. 110-119. IOS Press, (2015)Computing Reputation for Collaborative Private Networks., , , и . COMPSAC (1), стр. 246-253. IEEE Computer Society, (2009)Towards Global Explanations for Credit Risk Scoring., , и . CoRR, (2018)Extending Microaggregation Procedures for Time Series Protection., и . RSCTC, том 4259 из Lecture Notes in Computer Science, стр. 899-908. Springer, (2006)