Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Minimum Wiener Connector., , , , and . CoRR, (2015)A Classification-Based Methodology for Planning Audit Strategies in Fraud Detection., , , and . KDD, page 175-184. ACM, (1999)Learning influence probabilities in social networks., , and . WSDM, page 241-250. ACM, (2010)The query-flow graph: model and applications, , , , , and . CIKM '08: Proceeding of the 17th ACM conference on Information and knowledge management, page 609--618. New York, NY, USA, ACM, (2008)Pushing Constraints to Detect Local Patterns., and . Local Pattern Detection, volume 3539 of Lecture Notes in Computer Science, page 1-19. Springer, (2004)Probabilistic Causal Analysis of Social Influence., , , and . CIKM, page 1003-1012. ACM, (2018)Scalable dynamic graph summarization., , , and . IEEE BigData, page 1032-1039. IEEE Computer Society, (2016)Influence Propagation in Social Networks: A Data Mining Perspective.. Web Intelligence, page 2. IEEE Computer Society, (2011)From "Dango" to "Japanese Cakes": Query Reformulation Models and Patterns., , , and . Web Intelligence, page 183-190. IEEE Computer Society, (2009)Exposure Inequality in People Recommender Systems: The Long-Term Effects., , , and . ICWSM, page 194-204. AAAI Press, (2022)