Publications

You are here

Export 39 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
P. Mukala, Cerone, A., and Turini, F., An empirical verification of a-priori learning models on mailing archives in the context of online learning activities of participants in free$\backslash$libre open source software (FLOSS) communities, Education and Information Technologies, pp. 1–23, 2017.
P. Mukala, Cerone, A., and Turini, F., An exploration of learning processes as process maps in FLOSS repositories. 2015.
P. Mukala, Cerone, A., and Turini, F., Mining learning processes from FLOSS mailing archives, in Conference on e-Business, e-Services and e-Society, 2015.
P. Mukala, Cerone, A., and Turini, F., Process mining event logs from FLOSS data: state of the art and perspectives, in International Conference on Software Engineering and Formal Methods, 2014.
P. Mukala, Cerone, A., and Turini, F., Ontolifloss: Ontology for learning processes in FLOSS communities, in International Conference on Software Engineering and Formal Methods, 2014.
P. Mukala, Cerone, A., and Turini, F., An abstract state machine (ASM) representation of learning process in FLOSS communities, in International Conference on Software Engineering and Formal Methods, 2014.
P. Mukala, Cerone, A., and Turini, F., An empirical verification of a-priori learning models on mailing archives in the context of online learning activities of participants in free\libre open source software (FLOSS) communities, Education and Information Technologies, vol. 22, pp. 3207–3229, 2017.
D. Montesi, Renso, C., and Turini, F., Using Temporary Integrity Constraints to Optimize Databases, in FAPR, 1996, pp. 430-435.
A. Monreale, Trasarti, R., Pedreschi, D., Renso, C., and Bogorny, V., C-safety: a framework for the anonymization of semantic trajectories, Transactions on Data Privacy, vol. 4, pp. 73-101, 2011.
A. Monreale, Pinelli, F., Trasarti, R., and Giannotti, F., Location Prediction through Trajectory Pattern Mining (Extended Abstract), in SEBD, 2010, pp. 134-141.
A. Monreale, Trasarti, R., Renso, C., Pedreschi, D., and Bogorny, V., Preserving privacy in semantic-rich trajectories of human mobility, in SPRINGL, 2010, pp. 47-54.
A. Monreale, Rinzivillo, S., Pratesi, F., Giannotti, F., and Pedreschi, D., Privacy-by-Design in Big Data Analytics and Social Mining, EPJ Data Science, vol. 10, 2014.
A. Monreale, Pedreschi, D., Pensa, R. G., and Pinelli, F., Anonymity preserving sequential pattern mining, Artif. Intell. Law, vol. 22, pp. 141–173, 2014.
A. Monreale, Wang, H. Wendy, Pratesi, F., Rinzivillo, S., Pedreschi, D., Andrienko, G., and Andrienko, N., Privacy-Preserving Distributed Movement Data Aggregation, in Geographic Information Science at the Heart of Europe, D. Vandenbroucke, Bucher, B., and Crompvoets, J., Eds. Springer International Publishing, 2013, pp. 225-245.
A. Monreale, Andrienko, G., Andrienko, N., Giannotti, F., Pedreschi, D., Rinzivillo, S., and Wrobel, S., Movement Data Anonymity through Generalization, Transactions on Data Privacy, vol. 3, pp. 91–121, 2010.
A. Monreale and Wang, H. Wendy, Privacy-Preserving Outsourcing of Data Mining, in 40th IEEE Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016, Atlanta, GA, USA, 2016.
A. Monreale, Pinelli, F., Trasarti, R., and Giannotti, F., WhereNext: a Location Predictor on Trajectory Pattern Mining, 15th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 2009.
L. Milli, Monreale, A., Rossetti, G., Giannotti, F., Pedreschi, D., and Sebastiani, F., Quantification Trees, in 2013 IEEE 13th International Conference on Data Mining, Dallas, TX, USA, December 7-10, 2013, 2013, pp. 528–536.
L. Milli, Monreale, A., Rossetti, G., Pedreschi, D., Giannotti, F., and Sebastiani, F., Quantification in Social Networks, in International Conference on Data Science and Advanced Analytics (IEEE DSAA'2015), Paris, France, 2015.
L. Milli, Rossetti, G., Pedreschi, D., and Giannotti, F., Information diffusion in complex networks: The active/passive conundrum, in International Workshop on Complex Networks and their Applications, 2017.
L. Milli, Rossetti, G., Pedreschi, D., and Giannotti, F., Diffusive Phenomena in Dynamic Networks: a data-driven study, in International Conference on Complex Networks CompleNet, Boston March 5-8 2018, 2018.
L. Milli, Rossetti, G., Pedreschi, D., and Giannotti, F., Active and passive diffusion processes in complex networks, Applied network science, vol. 3, p. 42, 2018.
S. Mascetti, Monreale, A., Ricci, A., and Gerino, A., Anonymity: a Comparison between the Legal and Computer Science Perspectives., in The 5rd International Conference on Computers, Privacy, and Data Protection: “European Data Protection: Coming of Age”, 2012.
S. Mascetti, Ricci, A., and Ruggieri, S., Introduction to special issue on computational methods for enforcing privacy and fairness in the knowledge society, Artificial Intelligence and Law, vol. 22, pp. 109–111, 2014.
P. Mascellani and Pedreschi, D., Proving termination of Prolog programs, in GULP-PRODE (1), 1994, pp. 46-61.

Pages