Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Giannotti, Fosca
add a person with the name Giannotti, Fosca
 

Other publications of authors with the same name

Exante: A Preprocessing Method for Frequent-Pattern Mining., , , and . IEEE Intelligent Systems, 20 (3): 25-31 (2005)Semantics and Expressive Power of Nondeterministic Constructs in Deductive Databases., , and . J. Comput. Syst. Sci., 62 (1): 15-42 (2001)Data Science for Simulating the Era of Electric Vehicles., , , , and . KI, 26 (3): 275-278 (2012)Movement Data Anonymity through Generalization., , , , , , and . Trans. Data Privacy, 3 (2): 91-121 (2010)"You know because I know": a multidimensional network approach to human resources problem., , , , and . ASONAM, page 434-441. ACM, (2013)Geographic privacy-aware knowledge discovery and delivery., , and . EDBT, volume 360 of ACM International Conference Proceeding Series, page 1157-1158. ACM, (2009)A Classification-Based Methodology for Planning Audit Strategies in Fraud Detection., , , and . KDD, page 175-184. ACM, (1999)Personalized Market Basket Prediction with Temporal Annotated Recurring Sequences., , , , and . IEEE Trans. Knowl. Data Eng., 31 (11): 2151-2163 (2019)Towards low-perturbation anonymity preserving pattern discovery., , , and . SAC, page 588-592. ACM, (2006)Using Abstract Interpretation for Gate splitting in LOTOS Specifications., and . WSA, volume 81-82 of Series Bigre, page 194-204. Atelier Irisa, IRISA, Campus de Beaulieu, (1992)