Author of the publication

Processes Meet Big Data: Connecting Data Science with Process Science.

, and . IEEE Trans. Serv. Comput., 8 (6): 810-819 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Scalable Multi-Party Protocol for Privacy-Preserving Equality Test., , and . CAiSE Workshops, volume 148 of Lecture Notes in Business Information Processing, page 466-477. Springer, (2013)Designing of a type-2 fuzzy logic filter for improving edge-preserving restoration of interlaced-to-progressive conversion., , , , and . Inf. Sci., 179 (13): 2194-2207 (2009)Implementing a Reputation-Aware Gnutella Servent., , , , and . NETWORKING Workshops, volume 2376 of Lecture Notes in Computer Science, page 321-334. Springer, (2002)K-Means Clustering in Dual Space for Unsupervised Feature Partitioning in Multi-view Learning., , and . SITIS, page 1-8. IEEE, (2018)Overcoming NAT traversal issue for SIP-based communication in P2P networks., , and . WMNC, page 1-8. IEEE, (2011)Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges., , , , , and . MSTEC, volume 12512 of Lecture Notes in Computer Science, page 79-91. Springer, (2020)Balancing confidentiality and efficiency in untrusted relational DBMSs., , , , and . ACM Conference on Computer and Communications Security, page 93-102. ACM, (2003)Assessing Business Process Security Awareness: A Service-Oriented Approach., , and . AMCIS, page 89. Association for Information Systems, (2007)Long-term memory-induced synchronisation can impair collective performance in congested systems., , , , , , and . Swarm Intell., 13 (2): 95-114 (2019)Editorial., , , , , and . J. Inf. Secur. Appl., 18 (1): 1 (2013)