1. Abadi, M., et al.: Tensorflow: a system for large-scale machine learning. In: 12th $$\{$$USENIX$$\}$$ Symposium on Operating Systems Design and Implementation ($$\{$$OSDI$$\}$$ 16), pp. 265–283 (2016)
2. Arthur, D., Vassilvitskii, S.: k-means++: the advantages of careful seeding. In: Proceedings of the 18th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 1027–1035. New Orleans, LA, USA, January 2007
3. Bertolissi, C., den Hartog, J., Zannone, N.: Using provenance for secure data fusion in cooperative systems. In: Proceedings of the Symposium on Access Control Models and Technologies (SACMAT), pp. 185–194. Toronto, Canada, June 2019
4. Bonatti, P., De Capitani di Vimercati, S., Samarati, P.: An algebra for composing access control policies. ACM Trans. Inf. Syst. Security (TISSEC) 5(1), 1–35 (2002)
5. Brownstein, J., Cassa, C., Kohane, I., Mandl, K.: An unsupervised classification method for inferring original case locations from low-resolution disease maps. Int. J. Health Geographics 5, 56 (2006)