Carlos Sarraute

According to our database1, Carlos Sarraute authored at least 30 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
The value of big data for credit scoring: Enhancing financial inclusion using mobile phone data and social network analytics.
Appl. Soft Comput., 2019

Detecting Areas of Potential High Prevalence of Chagas in Argentina.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

2018
Prepaid or Postpaid? That Is the Question: Novel Methods of Subscription Type Prediction in Mobile Phone Services.
Proceedings of the Social Network Based Big Data Analysis and Applications, 2018

Correlations and dynamics of consumption patterns in social-economic networks.
Social Netw. Analys. Mining, 2018

Enriching sparse mobility information in Call Detail Records.
Computer Communications, 2018

Credit Scoring for Good: Enhancing Financial Inclusion with Smartphone-Based Microlending.
Proceedings of the International Conference on Information Systems, 2018

2017
Social network analytics for churn prediction in telco: Model building, evaluation and network architecture.
Expert Syst. Appl., 2017

Mobile data traffic modeling: Revealing temporal facets.
Computer Networks, 2017

Towards an adaptive completion of sparse Call Detail Records for mobility analysis.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

The Spatiotemporal Interplay of Regularity and Randomness in Cellular Data Traffic.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

2016
On the regularity of human mobility.
Pervasive and Mobile Computing, 2016

MobHet: Predicting human mobility using heterogeneous data sources.
Computer Communications, 2016

Call detail records to characterize usages and mobility events of phone users.
Computer Communications, 2016

Mobility and sociocultural events in mobile phone data records.
AI Commun., 2016

Performance evaluation of DTN protocols to deliver sms in dense mobile network : Empirical proofs.
Ad Hoc Networks, 2016

A comparative study of social network classifiers for predicting churn in the telecommunication industry.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

Analyzing the spread of chagas disease with mobile phone data.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

Correlations of consumption patterns in social-economic networks.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

A Bayesian approach to income inference in a communication network.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Inference of demographic attributes based on mobile phone usage patterns and social network topology.
Social Netw. Analys. Mining, 2015

Measurement-driven mobile data traffic modeling in a large metropolitan area.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015

Taking Benefit from the User Density in Large Cities for Delivering SMS.
Proceedings of the 12th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, 2015

2014
Harnessing Mobile Phone Social Network Topology to Infer Users Demographic Attributes.
Proceedings of the 8th Workshop on Social Network Mining and Analysis, 2014

A study of age and gender seen through mobile phone usage patterns in Mexico.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Human mobility and predictability enriched by social phenomena information.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
An algorithm to find optimal attack paths in nondeterministic scenarios.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2009
Simulating cyber-attacks for fun and profit.
Proceedings of the 2nd International Conference on Simulation Tools and Techniques for Communications, 2009

2006
Foundations and applications for secure triggers.
ACM Trans. Inf. Syst. Secur., 2006

2005
Foundations and Applications for Secure Triggers.
IACR Cryptology ePrint Archive, 2005


  Loading...