Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bounded Nondeterminism of Logic Programs., and . ICLP, page 350-364. MIT Press, (1999)WebCat: Automatic Categorization of Web Search Results., , , and . SEBD, page 507-518. Rubettino Editore, (2003)Measuring Discrimination in Socially-Sensitive Decision Records., , and . SDM, page 581-592. SIAM, (2009)Discovering Eras in Evolving Social Networks (Extended Abstract)., , , , and . SEBD, page 78-85. Esculapio Editore, (2010)C-safety: a framework for the anonymization of semantic trajectories., , , , and . Trans. Data Priv., 4 (2): 73-101 (2011)A classification for community discovery methods in complex networks., , and . Stat. Anal. Data Min., 4 (5): 512-546 (2011)(So) Big Data and the transformation of the city., , , , , , , , , and 8 other author(s). Int. J. Data Sci. Anal., 11 (4): 311-340 (2021)Privacy-by-design in big data analytics and social mining., , , , and . EPJ Data Sci., 3 (1): 10 (2014)Authenticated Outlier Mining for Outsourced Databases., , , , , and . IEEE Trans. Dependable Secur. Comput., 17 (2): 222-235 (2020)Unveiling the complexity of human mobility by querying and mining massive trajectory data., , , , , , and . VLDB J., 20 (5): 695-719 (2011)