Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Awareness of Distributed Data Clustering Algorithms Revisited., , and . IDA, volume 9897 of Lecture Notes in Computer Science, page 261-272. (2016)Reasoning with Constraints in Database Models., , , and . SEBD, page 23-38. Editrice Esculapio Progetto Leonardo, via U. Terracini, 30, 40131 Bologna, (1994)Representational Extensions of DLs., , and . Description Logics, page 11-13. AAAI Press, (1992)Training Support Vector Machines using Frank-Wolfe Optimization Methods., , , , and . IJPRAI, (2013)Self-supervised Bernoulli Autoencoders for Semi-supervised Hashing., , , , and . CIARP, volume 12702 of Lecture Notes in Computer Science, page 258-268. Springer, (2021)Inference Attacks in Peer-to-Peer Homogeneous Distributed Data Mining., , , and . ECAI, page 450-454. IOS Press, (2004)Fast and Scalable Lasso via Stochastic Frank-Wolfe Methods with a Convergence Guarantee., , , , and . CoRR, (2015)Consistency Checking in Complex Object Database Schemata with Integrity Constraints., , , and . IEEE Trans. Knowl. Data Eng., 10 (4): 576-598 (1998)Distributed Strategies for Mining Outliers in Large Data Sets., , , and . IEEE Trans. Knowl. Data Eng., 25 (7): 1520-1532 (2013)VidaMine: a visual data mining environment., , , , and . J. Vis. Lang. Comput., 15 (1): 37-67 (2004)