Claudio Silvestri

According to our database1, Claudio Silvestri authored at least 40 papers between 2004 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Analysing Trajectories of Mobile Users: From Data Warehouses to Recommender Systems.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
Manycore GPU processing of repeated range queries over streams of moving objects observations.
Concurrency and Computation: Practice and Experience, 2017

2016
Protecting Against Velocity-Based, Proximity-Based, and External Event Attacks in Location-Centric Social Networks.
ACM Trans. Spatial Algorithms and Systems, 2016

Detecting avoidance behaviors between moving object trajectories.
Data Knowl. Eng., 2016

2015
A wait-free output data structure for GPU-based streaming query processing.
Proceedings of the 23rd Italian Symposium on Advanced Database Systems, 2015

Mining condensed spatial co-location patterns.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems, 2015

Processing streams of spatial k-NN queries and position updates on manycore GPUs.
Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2015

2014
A general framework for trajectory data warehousing and visual OLAP.
GeoInformatica, 2014

Manycore processing of repeated range queries over massive moving objects observations.
CoRR, 2014

Manycore processing of repeated k-NN queries over massive moving objects observations.
CoRR, 2014

GPU-Based Computing of Repeated Range Queries over Moving Objects.
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014

2013
Mobility and Uncertainty.
Proceedings of the Mobility Data: Modeling, 2013

2012
gpuDCI: Exploiting GPUs in Frequent Itemset Mining.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012

Privacy-Preserving Sharing of Sensitive Semantic Locations under Road-Network Constraints.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

SAWLnet: Sensitivity Aware Location Cloaking on Road-NETworks.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

2011
Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications.
IEEE Pervasive Computing, 2011

Visual Mobility Analysis using T-Warehouse.
IJDWM, 2011

2010
The PROBE Framework for the Personalized Cloaking of Private Locations.
Trans. Data Privacy, 2010

Visual OLAP analysis on network constrained trajectories (Extended Abstract).
Proceedings of the Eighteenth Italian Symposium on Advanced Database Systems, 2010

T-Warehouse: Visual OLAP analysis on trajectory data.
Proceedings of the 26th International Conference on Data Engineering, 2010

Analyzing semantic locations cloaking techniques in a probabilistic grid-based map.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010

2009
Frequent spatio-temporal patterns in trajectory data warehouses.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Interactive Location Cloaking with the PROBE Obfuscator.
Proceedings of the MDM 2009, 2009

Preventing velocity-based linkage attacks in location-aware applications.
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009

Protecting location privacy against spatial inferences: the PROBE approach.
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

2008
Spatial Domains for the Administration of Location-based Access Control Policies.
J. Network Syst. Manage., 2008

Semantics-aware Obfuscation for Location Privacy.
JCSE, 2008

Trajectory Data Warehouses: Storing and Aggregating Frequent ST Patterns.
Proceedings of the Sixteenth Italian Symposium on Advanced Database Systems, 2008

Protecting Location Privacy through Semantics-aware Obfuscation Techniques.
Proceedings of the Trust Management II, 2008

Towards movement-aware access control.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

Approach to Supporting Continuity of Usage in Location-Based Access Control.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems.
Proceedings of the The Third International Conference on Availability, 2008

2007
Trajectory Data Warehouses: Design and Implementation Issues.
JCSE, 2007

Approximate mining of frequent patterns on streams.
Intell. Data Anal., 2007

Trajectory Data Warehouses: Design Issues and Use Cases.
Proceedings of the Fifteenth Italian Symposium on Advanced Database Systems, 2007

Approximate Aggregations in Trajectory Data Warehouses.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Spatio-temporal Aggregations in Trajectory Data Warehouses.
Proceedings of the Data Warehousing and Knowledge Discovery, 9th International Conference, 2007

2005
Distributed approximate mining of frequent patterns.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Mining Frequent Closed Itemsets from Distributed Repositories.
Proceedings of the First Workshop on Knowledge and Data Management in GRIDs, 2005

2004
A new algorithm for gap constrained sequence mining.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004


  Loading...