Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fraud Detection in Telecommunications: History and Lessons Learned., , and . Technometrics, 52 (1): 20-33 (2010)Measuring and extracting proximity in networks., , and . KDD, page 245-255. ACM, (2006)Building an Effective Representation for Dynamic Networks, , , and . Journal of Computational & Graphical Statistics, (September 2006)Telecommunications Fraud Detection, Using Social Networks for.. Encyclopedia of Social Network Analysis and Mining, (2014)Threatening Privacy across Social Graphs: A Structural Features Approach., , , , and . ICDM Workshops, page 554-561. IEEE Computer Society, (2014)Communities of interest., , and . Intell. Data Anal., 6 (3): 211-219 (2002)Human Mobility Characterization from Cellular Network Data, , , , , , , , , and . Communications of the ACM, 56 (1): 74--82 (January 2013)Communities of Interest., , and . IDA, volume 2189 of Lecture Notes in Computer Science, page 105-114. Springer, (2001)Parallel coordinates for exploratory modelling analysis., , and . Comput. Stat. Data Anal., 43 (4): 553-564 (2003)Tuning representations of dynamic network data., , , and . LinkKDD, page 25-27. ACM, (2005)