Author of the publication

Application and Testing of Business Processes in the Energy Domain.

, , , , , , , and . BTW (Workshops), volume P-266 of LNI, page 25-32. GI, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of the Performance of AdaBoost.M2 for the Simulated Digit-Recognition-Example., and . ECML, volume 2167 of Lecture Notes in Computer Science, page 109-120. Springer, (2001)Who Stores the Private Key? An Exploratory Study about User Preferences of Key Management for Blockchain-based Applications., , , , and . ICISSP, page 23-32. SCITEPRESS, (2021)Evaluation of clustering methods for finding dominant optical flow fields in crowded scenes., and . ICPR, page 1-4. IEEE Computer Society, (2008)Pool detection from smart metering data with convolutional neural networks., , , , and . Energy Inform., (2019)Influence of data granularity on nonintrusive appliance load monitoring., and . IH&MMSec, page 147-151. ACM, (2014)Quantifying identifiability to choose and audit epsilon in differentially private deep learning., , , , and . Proc. VLDB Endow., 14 (13): 3335-3347 (2021)How unique is weekly smart meter data?, , , , and . Energy Inform., (2022)Insights into Unsupervised Holiday Detection from Low-Resolution Smart Metering Data., , and . ICISSP (Revised Selected Papers), volume 977 of Communications in Computer and Information Science, page 281-302. Springer, (2018)Privacy-relevant smart metering use cases., , and . ICIT, page 1387-1392. IEEE, (2015)How to Make AdaBoost.M1 Work for Weak Base Classifiers by Changing Only One Line of the Code., and . ECML, volume 2430 of Lecture Notes in Computer Science, page 72-83. Springer, (2002)