Carlos Sarraute

According to our database1, Carlos Sarraute authored at least 65 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Fair and Decentralized Exchange of Digital Goods.
IACR Cryptol. ePrint Arch., 2020

Segregated interactions in urban and online space.
EPJ Data Sci., 2020

Snel: SQL Native Execution for LLVM.
CoRR, 2020

WibsonTree: Efficiently Preserving Seller's Privacy in a Decentralized Data Marketplace.
CoRR, 2020

BatPay: a gas efficient protocol for the recurrent micropayment of ERC20 tokens.
CoRR, 2020

Wibson Protocol for Secure Data Exchange and Batch Payments.
CoRR, 2020

Computing Accessibility Metrics for Argentina.
CoRR, 2020

2019
Complete trajectory reconstruction from sparse mobile phone data.
EPJ Data Sci., 2019

Segregated interactions in urban and online spaces.
CoRR, 2019

Secure Exchange of Digital Goods in a Decentralized Data Marketplace.
CoRR, 2019

The value of big data for credit scoring: Enhancing financial inclusion using mobile phone data and social network analytics.
Appl. Soft Comput., 2019

Detecting Areas of Potential High Prevalence of Chagas in Argentina.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

2018
Prepaid or Postpaid? That Is the Question: Novel Methods of Subscription Type Prediction in Mobile Phone Services.
Proceedings of the Social Network Based Big Data Analysis and Applications, 2018

Correlations and dynamics of consumption patterns in social-economic networks.
Social Netw. Analys. Mining, 2018

Wibson: A Decentralized Data Marketplace.
CoRR, 2018

Brief survey of Mobility Analyses based on Mobile Phone Datasets.
CoRR, 2018

Comparison of Feature Extraction Methods and Predictors for Income Inference.
CoRR, 2018

Uncovering the Spread of Chagas Disease in Argentina and Mexico.
CoRR, 2018

Inference of Users Demographic Attributes based on Homophily in Communication Networks.
CoRR, 2018

Point Process Models for Distribution of Cell Phone Antennas.
CoRR, 2018

Enriching sparse mobility information in Call Detail Records.
Comput. Commun., 2018

Credit Scoring for Good: Enhancing Financial Inclusion with Smartphone-Based Microlending.
Proceedings of the International Conference on Information Systems, 2018

2017
Social network analytics for churn prediction in telco: Model building, evaluation and network architecture.
Expert Syst. Appl., 2017

The City Pulse of Buenos Aires.
CoRR, 2017

Social Events in a Time-Varying Mobile Phone Graph.
CoRR, 2017

Inferring Personal Economic Status from Social Network Location.
CoRR, 2017

Prepaid or Postpaid? That is the question. Novel Methods of Subscription Type Prediction in Mobile Phone Services.
CoRR, 2017

Mobile data traffic modeling: Revealing temporal facets.
Comput. Networks, 2017

Towards an adaptive completion of sparse Call Detail Records for mobility analysis.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

The Spatiotemporal Interplay of Regularity and Randomness in Cellular Data Traffic.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

2016
On the regularity of human mobility.
Pervasive Mob. Comput., 2016

Socioeconomic correlations and stratification in social-communication networks.
CoRR, 2016

MobHet: Predicting human mobility using heterogeneous data sources.
Comput. Commun., 2016

Call detail records to characterize usages and mobility events of phone users.
Comput. Commun., 2016

Mobility and sociocultural events in mobile phone data records.
AI Commun., 2016

Performance evaluation of DTN protocols to deliver sms in dense mobile network : Empirical proofs.
Ad Hoc Networks, 2016

A comparative study of social network classifiers for predicting churn in the telecommunication industry.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

Analyzing the spread of chagas disease with mobile phone data.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

Correlations of consumption patterns in social-economic networks.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

A Bayesian approach to income inference in a communication network.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Inference of demographic attributes based on mobile phone usage patterns and social network topology.
Social Netw. Analys. Mining, 2015

Measurement-driven mobile data traffic modeling in a large metropolitan area.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015

Taking Benefit from the User Density in Large Cities for Delivering SMS.
Proceedings of the 12th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, 2015

2014
Harnessing Mobile Phone Social Network Topology to Infer Users Demographic Attributes.
Proceedings of the 8th Workshop on Social Network Mining and Analysis, 2014

A study of age and gender seen through mobile phone usage patterns in Mexico.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Aplicacion de las Redes Neuronales al Reconocimiento de Sistemas Operativos
CoRR, 2013

Evolution of Communities with Focus on Stability.
CoRR, 2013

Evolution of Communities with Focus on Stability (extended abstract).
CoRR, 2013

Les POMDP font de meilleurs hackers: Tenir compte de l'incertitude dans les tests de penetration.
CoRR, 2013

Penetration Testing == POMDP Solving?
CoRR, 2013

Automated Attack Planning.
CoRR, 2013

Human Mobility and Predictability enriched by Social Phenomena Information (extended abstract).
CoRR, 2013

Attack Planning in the Real World.
CoRR, 2013

An Oblivious Password Cracking Server.
CoRR, 2013

Human mobility and predictability enriched by social phenomena information.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
An algorithm to find optimal attack paths in nondeterministic scenarios.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2010
Outrepasser les limites des techniques classiques de Prise d'Empreintes grace aux Reseaux de Neurones
CoRR, 2010

An attack on MySQL's login protocol
CoRR, 2010

Simulation of Computer Network Attacks
CoRR, 2010

Advanced Software Protection Now
CoRR, 2010

Using Neural Networks to improve classical Operating System Fingerprinting techniques
CoRR, 2010

Building Computer Network Attacks
CoRR, 2010

2009
Simulating cyber-attacks for fun and profit.
Proceedings of the 2nd International Conference on Simulation Tools and Techniques for Communications, 2009

2006
Foundations and applications for secure triggers.
ACM Trans. Inf. Syst. Secur., 2006


  Loading...