Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Declarative Semantics for Pruning Operators in Logic Programming., and . LPNMR, page 27-37. (1990)A Complexity Science Perspective on Human Mobility., , , and . Mobility Data, Cambridge University Press, (2013)On multidimensional network measures., , , and . SEBD, page 215-222. Curran Associates, (2013)PRIMULE: Privacy risk mitigation for user profiles., , , , and . Data Knowl. Eng., (2020)Evaluating the Privacy Exposure of Interpretable Global Explainers., , and . CogMI, page 13-19. IEEE, (2022)A modularized framework for explaining hierarchical attention networks on text classifiers., , , , , , and . Canadian AI, Canadian Artificial Intelligence Association, (2021)Using Data Mining Techniques in Fiscal Fraud Detection., , , and . DaWaK, volume 1676 of Lecture Notes in Computer Science, page 369-376. Springer, (1999)Clustering Individual Transactional Data for Masses of Users., , , , and . KDD, page 195-204. ACM, (2017)Invited talk: Logical Data Mining Query Languages.. KDID, page 1. Helsinki University Printing House, Helsinki, (2002)Pre-processing for Constrained Pattern Mining., , , and . SEBD, page 519-530. Rubettino Editore, (2003)