generated by bibbase.org
  2021 (8)
A multi-perspective approach for the analysis of complex business processes behavior. Guzzo, A.; Joaristi, M.; Rullo, A.; and Serra, E. Expert Syst. Appl., 177: 114934. 2021.
A multi-perspective approach for the analysis of complex business processes behavior [link]Paper   doi   link   bibtex  
SIR-GN: A Fast Structural Iterative Representation Learning Approach For Graph Nodes. Joaristi, M.; and Serra, E. ACM Trans. Knowl. Discov. Data, 15(6): 100:1–100:39. 2021.
SIR-GN: A Fast Structural Iterative Representation Learning Approach For Graph Nodes [link]Paper   doi   link   bibtex  
V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities. Das, S. S.; Serra, E.; Halappanavar, M.; Pothen, A.; and Al-Shaer, E. In 8th IEEE International Conference on Data Science and Advanced Analytics, DSAA 2021, Porto, Portugal, October 6-9, 2021, pages 1–12, 2021.
V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities [link]Paper   doi   link   bibtex  
cuTS: scaling subgraph isomorphism on distributed multi-GPU systems using trie based data structure. Xiang, L.; Khan, A.; Serra, E.; Halappanavar, M.; and Sukumaran-Rajam, A. In SC '21: The International Conference for High Performance Computing, Networking, Storage and Analysis, St. Louis, Missouri, USA, November 14 - 19, 2021, pages 69:1–69:14, 2021.
cuTS: scaling subgraph isomorphism on distributed multi-GPU systems using trie based data structure [link]Paper   doi   link   bibtex  
An Effective and Efficient Graph Representation Learning Approach for Big Graphs. Serra, E.; Joaristi, M.; Cuzzocrea, A.; Soufargi, S.; and Leung, C. K. In Proceedings of the 29th Italian Symposium on Advanced Database Systems, SEBD 2021, Pizzo Calabro (VV), Italy, September 5-9, 2021, pages 140–149, 2021.
An Effective and Efficient Graph Representation Learning Approach for Big Graphs [pdf]Paper   link   bibtex  
Multi-Sorted Inverse Frequent Itemsets Mining for Generating Realistic No-SQL Datasets (Discussion Paper). Saccà, D.; Serra, E.; and Rullo, A. In Proceedings of the 29th Italian Symposium on Advanced Database Systems, SEBD 2021, Pizzo Calabro (VV), Italy, September 5-9, 2021, pages 347–354, 2021.
Multi-Sorted Inverse Frequent Itemsets Mining for Generating Realistic No-SQL Datasets (Discussion Paper) [pdf]Paper   link   bibtex  
V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities. Das, S. S.; Serra, E.; Halappanavar, M.; Pothen, A.; and Al-Shaer, E. CoRR, abs/2102.11498. 2021.
V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities [link]Paper   link   bibtex  
Inferential SIR-GN: Scalable Graph Representation Learning. Layne, J.; and Serra, E. CoRR, abs/2111.04826. 2021.
Inferential SIR-GN: Scalable Graph Representation Learning [link]Paper   link   bibtex  
  2020 (9)
Top-k user-specified preferred answers in massive graph databases. Park, N.; Pugliese, A.; Serra, E.; and Subrahmanian, V. S. Data Knowl. Eng., 127: 101798. 2020.
Top-k user-specified preferred answers in massive graph databases [link]Paper   doi   link   bibtex  
Multi-modal social and psycho-linguistic embedding via recurrent neural networks to identify depressed users in online forums. Shrestha, A.; Serra, E.; and Spezzano, F. Netw. Model. Anal. Health Informatics Bioinform., 9(1): 22. 2020.
Multi-modal social and psycho-linguistic embedding via recurrent neural networks to identify depressed users in online forums [link]Paper   doi   link   bibtex  
PIE: A Data-Driven Payoff Inference Engine for Strategic Security Applications. Chen, H.; Hajiaghayi, M. T.; Kraus, S.; Sawant, A.; Serra, E.; Subrahmanian, V. S.; and Xiong, Y. IEEE Trans. Comput. Soc. Syst., 7(1): 42–57. 2020.
PIE: A Data-Driven Payoff Inference Engine for Strategic Security Applications [link]Paper   doi   link   bibtex  
Validating Bad Entity Ranking in the Panama Papers via Open-source Intelligence. Winiecki, D.; Kappelman, K.; Hay, B.; Joaristi, M.; Serra, E.; and Spezzano, F. In IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2020, The Hague, Netherlands, December 7-10, 2020, pages 752–759, 2020.
Validating Bad Entity Ranking in the Panama Papers via Open-source Intelligence [link]Paper   doi   link   bibtex  
An Innovative Framework for Supporting Remote Sensing in Image Processing Systems via Deep Transfer Learning. Korzh, O.; Sharma, A.; Joaristi, M.; Serra, E.; and Cuzzocrea, A. In 2020 IEEE International Conference on Big Data (IEEE BigData 2020), Atlanta, GA, USA, December 10-13, 2020, pages 5098–5107, 2020.
An Innovative Framework for Supporting Remote Sensing in Image Processing Systems via Deep Transfer Learning [link]Paper   doi   link   bibtex  
Large-scale Sparse Structural Node Representation. Serra, E.; Joaristi, M.; and Cuzzocrea, A. In 2020 IEEE International Conference on Big Data (IEEE BigData 2020), Atlanta, GA, USA, December 10-13, 2020, pages 5247–5253, 2020.
Large-scale Sparse Structural Node Representation [link]Paper   doi   link   bibtex  
DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems. Serra, E.; Shrestha, A.; Spezzano, F.; and Squicciarini, A. C. In CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020, pages 29–38, 2020.
DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems [link]Paper   doi   link   bibtex  
vSwitchGuard: Defending OpenFlow Switches Against Saturation Attacks. Khamaiseh, S.; Serra, E.; and Xu, D. In 44th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2020, Madrid, Spain, July 13-17, 2020, pages 851–860, 2020.
vSwitchGuard: Defending OpenFlow Switches Against Saturation Attacks [link]Paper   doi   link   bibtex  
A Framework for the Multi-modal Analysis of Novel Behavior in Business Processes. Rullo, A.; Guzzo, A.; Serra, E.; and Tirrito, E. In Intelligent Data Engineering and Automated Learning - IDEAL 2020 - 21st International Conference, Guimaraes, Portugal, November 4-6, 2020, Proceedings, Part I, pages 51–63, 2020.
A Framework for the Multi-modal Analysis of Novel Behavior in Business Processes [link]Paper   doi   link   bibtex  
  2019 (7)
Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications. Saccà, D.; Serra, E.; and Rullo, A. Data Min. Knowl. Discov., 33(6): 1736–1774. 2019.
Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications [link]Paper   doi   link   bibtex  
Detecting suspicious entities in Offshore Leaks networks. Joaristi, M.; Serra, E.; and Spezzano, F. Soc. Netw. Anal. Min., 9(1): 62:1–62:15. 2019.
Detecting suspicious entities in Offshore Leaks networks [link]Paper   doi   link   bibtex  
Number of Minimal Hypergraph Transversals and Complexity of IFM with Infrequency: High in Theory, but Often Not so Much in Practice!. Saccà, D.; and Serra, E. In AI*IA 2019 - Advances in Artificial Intelligence - XVIIIth International Conference of the Italian Association for Artificial Intelligence, Rende, Italy, November 19-22, 2019, Proceedings, pages 193–209, 2019.
Number of Minimal Hypergraph Transversals and Complexity of IFM with Infrequency: High in Theory, but Often Not so Much in Practice! [link]Paper   doi   link   bibtex  
RIBS: Risky Blind-Spots for Attack Classification Models. Joaristi, M.; Putnam, A.; Cuzzocrea, A.; and Serra, E. In 2019 IEEE International Conference on Big Data (IEEE BigData), Los Angeles, CA, USA, December 9-12, 2019, pages 5773–5779, 2019.
RIBS: Risky Blind-Spots for Attack Classification Models [link]Paper   doi   link   bibtex  
Framework for Detecting Control Command Injection Attacks on Industrial Control Systems (ICS). Rasapour, F.; Serra, E.; and Mehrpouyan, H. In 2019 Seventh International Symposium on Computing and Networking, CANDAR 2019, Nagasaki, Japan, November 25-28, 2019, pages 211–217, 2019.
Framework for Detecting Control Command Injection Attacks on Industrial Control Systems (ICS) [link]Paper   doi   link   bibtex  
Detecting Saturation Attacks in SDN via Machine Learning. Khamaiseh, S.; Serra, E.; Li, Z.; and Xu, D. In 2019 4th International Conference on Computing, Communications and Security (ICCCS), Rome, Italy, October 10-12, 2019, pages 1–8, 2019.
Detecting Saturation Attacks in SDN via Machine Learning [link]Paper   doi   link   bibtex  
Optimal Placement of Security Resources for the Internet of Things. Rullo, A.; Serra, E.; Bertino, E.; and Lobo, J. In The Internet of Things for Smart Urban Ecosystems, pages 95–124. 2019.
Optimal Placement of Security Resources for the Internet of Things [link]Paper   doi   link   bibtex  
  2018 (10)
Hybrid adversarial defense: Merging honeypots and traditional security methods. Chakraborty, T.; Jajodia, S.; Park, N.; Pugliese, A.; Serra, E.; and Subrahmanian, V. S. J. Comput. Secur., 26(5): 615–645. 2018.
Hybrid adversarial defense: Merging honeypots and traditional security methods [link]Paper   doi   link   bibtex  
SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine. Jajodia, S.; Park, N.; Serra, E.; and Subrahmanian, V. S. ACM Trans. Internet Techn., 18(3): 30:1–30:41. 2018.
SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine [link]Paper   doi   link   bibtex  
Inferring Bad Entities Through the Panama Papers Network. Joaristi, M.; Serra, E.; and Spezzano, F. In IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018, Barcelona, Spain, August 28-31, 2018, pages 767–773, 2018.
Inferring Bad Entities Through the Panama Papers Network [link]Paper   doi   link   bibtex  
Unknown Landscape Identification with CNN Transfer Learning. Serra, E.; Sharma, A.; Joaristi, M.; and Korzh, O. In IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018, Barcelona, Spain, August 28-31, 2018, pages 813–820, 2018.
Unknown Landscape Identification with CNN Transfer Learning [link]Paper   doi   link   bibtex  
Convolutional Neural Network Ensemble Fine-Tuning for Extended Transfer Learning. Korzh, O.; Joaristi, M.; and Serra, E. In Big Data - BigData 2018 - 7th International Congress, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings, pages 110–123, 2018.
Convolutional Neural Network Ensemble Fine-Tuning for Extended Transfer Learning [link]Paper   doi   link   bibtex  
Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A Review. Rullo, A.; Serra, E.; and Lobo, J. In Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, PADG@ESORICS 2018, September 6, 2018, Barcelona, Spain], pages 202–226, 2018.
Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A Review [link]Paper   doi   link   bibtex  
A Crowdsourcing Semi-Supervised LSTM Training Approach to Identify Novel Items in Emerging Artificial Intelligent Environments. Serra, E.; Akella, H.; and Cuzzocrea, A. In 17th IEEE International Conference on Machine Learning and Applications, ICMLA 2018, Orlando, FL, USA, December 17-20, 2018, pages 1479–1485, 2018.
A Crowdsourcing Semi-Supervised LSTM Training Approach to Identify Novel Items in Emerging Artificial Intelligent Environments [link]Paper   doi   link   bibtex  
The Inverse Tree-OLAP Problem: Definitions, Models, Complexity Analysis, and a Possible Solution. Saccà, D.; Serra, E.; and Cuzzocrea, A. In Proceedings of the 22nd International Database Engineering & Applications Symposium, IDEAS 2018, Villa San Giovanni, Italy, June 18-20, 2018, pages 148–156, 2018.
The Inverse Tree-OLAP Problem: Definitions, Models, Complexity Analysis, and a Possible Solution [link]Paper   doi   link   bibtex  
Estimation of Remote Sensing Imagery Atmospheric Conditions Using Deep Learning and Image Classification. Korzh, O.; and Serra, E. In Intelligent Systems and Applications - Proceedings of the 2018 Intelligent Systems Conference, IntelliSys 2018, London, UK, September 6-7, 2018, Volume 2, pages 1237–1244, 2018.
Estimation of Remote Sensing Imagery Atmospheric Conditions Using Deep Learning and Image Classification [link]Paper   doi   link   bibtex  
Inverse Tree-OLAP: Definition, Complexity and First Solution. Saccà, D.; Serra, E.; and Cuzzocrea, A. In Proceedings of the 26th Italian Symposium on Advanced Database Systems, Castellaneta Marina (Taranto), Italy, June 24-27, 2018, 2018.
Inverse Tree-OLAP: Definition, Complexity and First Solution [pdf]Paper   link   bibtex  
  2017 (6)
A Probabilistic Logic of Cyber Deception. Jajodia, S.; Park, N.; Pierazzi, F.; Pugliese, A.; Serra, E.; Simari, G. I.; and Subrahmanian, V. S. IEEE Trans. Inf. Forensics Secur., 12(11): 2532–2544. 2017.
A Probabilistic Logic of Cyber Deception [link]Paper   doi   link   bibtex  
Pareto Optimal Security Resource Allocation for Internet of Things. Rullo, A.; Midi, D.; Serra, E.; and Bertino, E. ACM Trans. Priv. Secur., 20(4): 15:1–15:30. 2017.
Pareto Optimal Security Resource Allocation for Internet of Things [link]Paper   doi   link   bibtex  
Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios. Rullo, A.; Serra, E.; Bertino, E.; and Lobo, J. In Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II, pages 419–436, 2017.
Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios [link]Paper   doi   link   bibtex  
Shortfall-Based Optimal Security Provisioning for Internet of Things. Rullo, A.; Serra, E.; Bertino, E.; and Lobo, J. In 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-8, 2017, pages 2585–2586, 2017.
Shortfall-Based Optimal Security Provisioning for Internet of Things [link]Paper   doi   link   bibtex  
A Game of Things: Strategic Allocation of Security Resources for IoT. Rullo, A.; Midi, D.; Serra, E.; and Bertino, E. In Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, IoTDI 2017, Pittsburgh, PA, USA, April 18-21, 2017, pages 185–190, 2017.
A Game of Things: Strategic Allocation of Security Resources for IoT [link]Paper   doi   link   bibtex  
Evaluating the Privacy Implications of Frequent Itemset Disclosure. Serra, E.; Vaidya, J.; Akella, H.; and Sharma, A. In ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings, pages 506–519, 2017.
Evaluating the Privacy Implications of Frequent Itemset Disclosure [link]Paper   doi   link   bibtex  
  2016 (7)
Using temporal probabilistic logic for optimal monitoring of security events with limited resources. Jajodia, S.; Park, N.; Serra, E.; and Subrahmanian, V. S. J. Comput. Secur., 24(6): 735–791. 2016.
Using temporal probabilistic logic for optimal monitoring of security events with limited resources [link]Paper   doi   link   bibtex  
Multi-Sorted Inverse Frequent Itemsets Mining: On-Going Research. Saccà, D.; Serra, E.; and Piccolo, A. In Proceedings of the 10th Alberto Mendelzon International Workshop on Foundations of Data Management, Panama City, Panama, May 8-10, 2016, 2016.
Multi-Sorted Inverse Frequent Itemsets Mining: On-Going Research [pdf]Paper   link   bibtex  
Evaluating the impact of social media in detecting health-violating restaurants. Joaristi, M.; Serra, E.; and Spezzano, F. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016, San Francisco, CA, USA, August 18-21, 2016, pages 626–633, 2016.
Evaluating the impact of social media in detecting health-violating restaurants [link]Paper   doi   link   bibtex  
Strategic Security Resource Allocation for Internet of Things. Rullo, A.; Midi, D.; Serra, E.; and Bertino, E. In 36th IEEE International Conference on Distributed Computing Systems, ICDCS 2016, Nara, Japan, June 27-30, 2016, pages 737–738, 2016.
Strategic Security Resource Allocation for Internet of Things [link]Paper   doi   link   bibtex  
Metric Logic Program Explanations for Complex Separator Functions. Kumar, S.; Serra, E.; Spezzano, F.; and Subrahmanian, V. S. In Scalable Uncertainty Management - 10th International Conference, SUM 2016, Nice, France, September 21-23, 2016, Proceedings, pages 199–213, 2016.
Metric Logic Program Explanations for Complex Separator Functions [link]Paper   doi   link   bibtex  
ChoiceGAPs: Competitive Diffusion as a Massive Multi-player Game in Social Networks. Serra, E.; Spezzano, F.; and Subrahmanian, V. S. In Scalable Uncertainty Management - 10th International Conference, SUM 2016, Nice, France, September 21-23, 2016, Proceedings, pages 303–319, 2016.
ChoiceGAPs: Competitive Diffusion as a Massive Multi-player Game in Social Networks [link]Paper   doi   link   bibtex  
Ensemble Models for Data-driven Prediction of Malware Infections. Kang, C.; Park, N.; Prakash, B. A.; Serra, E.; and Subrahmanian, V. S. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, San Francisco, CA, USA, February 22-25, 2016, pages 583–592, 2016.
Ensemble Models for Data-driven Prediction of Malware Infections [link]Paper   doi   link   bibtex  
  2015 (4)
Saving Rhinos with Predictive Analytics. Park, N.; Serra, E.; and Subrahmanian, V. S. IEEE Intell. Syst., 30(4): 86–88. 2015.
Saving Rhinos with Predictive Analytics [link]Paper   doi   link   bibtex  
APE: A Data-Driven, Behavioral Model-Based Anti-Poaching Engine. Park, N.; Serra, E.; Snitch, T.; and Subrahmanian, V. S. IEEE Trans. Comput. Soc. Syst., 2(2): 15–37. 2015.
APE: A Data-Driven, Behavioral Model-Based Anti-Poaching Engine [link]Paper   doi   link   bibtex  
Pareto-Optimal Adversarial Defense of Enterprise Systems. Serra, E.; Jajodia, S.; Pugliese, A.; Rullo, A.; and Subrahmanian, V. S. ACM Trans. Inf. Syst. Secur., 17(3): 11:1–11:39. 2015.
Pareto-Optimal Adversarial Defense of Enterprise Systems [link]Paper   doi   link   bibtex  
An Effective GPU-Based Approach to Probabilistic Query Confidence Computation. Serra, E.; and Spezzano, F. IEEE Trans. Knowl. Data Eng., 27(1): 17–31. 2015.
An Effective GPU-Based Approach to Probabilistic Query Confidence Computation [link]Paper   doi   link   bibtex  
  2014 (3)
Behavior Informatics: A New Perspective. Cao, L.; Joachims, T.; Wang, C.; Gaussier, É.; Li, J.; Ou, Y.; Luo, D.; Zafarani, R.; Liu, H.; Xu, G.; Wu, Z.; Pasi, G.; Zhang, Y.; Yang, X.; Zha, H.; Serra, E.; and Subrahmanian, V. S. IEEE Intell. Syst., 29(4): 62–80. 2014.
Behavior Informatics: A New Perspective [link]Paper   doi   link   bibtex  
A Survey of Quantitative Models of Terror Group Behavior and an Analysis of Strategic Disclosure of Behavioral Models. Serra, E.; and Subrahmanian, V. S. IEEE Trans. Comput. Soc. Syst., 1(1): 66–88. 2014.
A Survey of Quantitative Models of Terror Group Behavior and an Analysis of Strategic Disclosure of Behavioral Models [link]Paper   doi   link   bibtex  
ChoiceGAPs: Competitive Diffusion as a Massive Multi-Player Game in Social Networks. Serra, E.; Spezzano, F.; and Subrahmanian, V. S. CoRR, abs/1410.6118. 2014.
ChoiceGAPs: Competitive Diffusion as a Massive Multi-Player Game in Social Networks [link]Paper   link   bibtex  
  2013 (6)
Solving inverse frequent itemset mining with infrequency constraints via large-scale linear programs. Guzzo, A.; Moccia, L.; Saccà, D.; and Serra, E. ACM Trans. Knowl. Discov. Data, 7(4): 18:1–18:39. 2013.
Solving inverse frequent itemset mining with infrequency constraints via large-scale linear programs [link]Paper   doi   link   bibtex  
A declarative extension of horn clauses, and its significance for datalog and its applications. Mazuran, M.; Serra, E.; and Zaniolo, C. Theory Pract. Log. Program., 13(4-5): 609–623. 2013.
A declarative extension of horn clauses, and its significance for datalog and its applications [link]Paper   doi   link   bibtex  
Extending the power of datalog recursion. Mazuran, M.; Serra, E.; and Zaniolo, C. VLDB J., 22(4): 471–493. 2013.
Extending the power of datalog recursion [link]Paper   doi   link   bibtex  
A Monotonic Extension for Horn-Clauses and its Significance in Datalog's Renaissance. Mazuran, M.; Serra, E.; and Zaniolo, C. In Proceedings of the 7th Alberto Mendelzon International Workshop on Foundations of Data Management, Puebla/Cholula, Mexico, May 21-23, 2013, 2013.
A Monotonic Extension for Horn-Clauses and its Significance in Datalog's Renaissance [pdf]Paper   link   bibtex  
Data Posting: a New Frontier for Data Exchange in the Big Data Era. Saccà, D.; and Serra, E. In Proceedings of the 7th Alberto Mendelzon International Workshop on Foundations of Data Management, Puebla/Cholula, Mexico, May 21-23, 2013, 2013.
Data Posting: a New Frontier for Data Exchange in the Big Data Era [pdf]Paper   link   bibtex  
Multi-Sorted Inverse Frequent Itemsets Mining. Saccà, D.; Serra, E.; Dicosta, P.; and Piccolo, A. CoRR, abs/1310.3939. 2013.
Multi-Sorted Inverse Frequent Itemsets Mining [link]Paper   link   bibtex  
  2012 (4)
Data Exchange in Datalog Is Mainly a Matter of Choice. Saccà, D.; and Serra, E. In Datalog in Academia and Industry - Second International Workshop, Datalog 2.0, Vienna, Austria, September 11-13, 2012. Proceedings, pages 153–164, 2012.
Data Exchange in Datalog Is Mainly a Matter of Choice [link]Paper   doi   link   bibtex  
Count Constraints and the Inverse OLAP Problem: Definition, Complexity and a Step toward Aggregate Data Exchange. Saccà, D.; Serra, E.; and Guzzo, A. In Foundations of Information and Knowledge Systems - 7th International Symposium, FoIKS 2012, Kiel, Germany, March 5-9, 2012. Proceedings, pages 352–369, 2012.
Count Constraints and the Inverse OLAP Problem: Definition, Complexity and a Step toward Aggregate Data Exchange [link]Paper   doi   link   bibtex  
Count Constraints for Inverse OLAP and Aggregate Data Exchange. Saccà, D.; Serra, E.; and Guzzo, A. In Twentieth Italian Symposium on Advanced Database Systems, SEBD 2012, Venice, Italy, June 24-27, 2012, Proceedings, pages 27–34, 2012.
Count Constraints for Inverse OLAP and Aggregate Data Exchange [link]Paper   link   bibtex  
An Extension of Datalog for Graph Queries. Mazuran, M.; Serra, E.; and Zaniolo, C. In Twentieth Italian Symposium on Advanced Database Systems, SEBD 2012, Venice, Italy, June 24-27, 2012, Proceedings, pages 177–184, 2012.
An Extension of Datalog for Graph Queries [link]Paper   link   bibtex  
  2011 (1)
A Decomposition Technique for the Inverse Frequent Itemset Mining Problem. Guzzo, A.; Moccia, L.; Saccà, D.; and Serra, E. In Sistemi Evoluti per Basi di Dati - SEBD 2011, Proceedings of the Nineteenth Italian Symposium on Advanced Database Systems, Maratea, Italy, June 26-29, 2011, pages 66–75, 2011.
link   bibtex  
  2009 (1)
An Effective Approach to Inverse Frequent Set Mining. Guzzo, A.; Saccà, D.; and Serra, E. In ICDM 2009, The Ninth IEEE International Conference on Data Mining, Miami, Florida, USA, 6-9 December 2009, pages 806–811, 2009.
An Effective Approach to Inverse Frequent Set Mining [link]Paper   doi   link   bibtex