Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework Enhancing the User Search Activity Through Data Posting., , , and . RuleML, volume 9718 of Lecture Notes in Computer Science, page 287-304. Springer, (2016)WFinger: a joint-decoder for very short Tardos fingerprinting codes., , , and . IDEAS, page 176-183. ACM, (2017)How, Who and When: Enhancing Business Process Warehouses By Graph Based Queries., , , , , and . IDEAS, page 242-247. ACM, (2016)Big Data Techniques For Supporting Accurate Predictions of Energy Production From Renewable Sources., , , , , , , , and . IDEAS, page 62-71. ACM, (2015)A Probabilistic Unified Framework for Event Abstraction and Process Detection from Log Data., , , , and . OTM Conferences, volume 9415 of Lecture Notes in Computer Science, page 320-328. Springer, (2015)Efficiently interpreting traces of low level events in business process logs., , , , and . Inf. Syst., (2018)Cluster Algorithm for Social Choice., , , , , , , and . PKDD/ECML Workshops (1), volume 1752 of Communications in Computer and Information Science, page 227-237. Springer, (2022)Sentimental Analysis Applications and Approaches during COVID-19: A Survey., , and . IDEAS, page 304-308. ACM, (2021)High Performance Computing by the Crowd., , , , , and . Intelligent Methods and Big Data in Industrial Applications, volume 40 of Studies in Big Data, Springer, (2019)An Overview of the Endless Battle between Virus Writers and Detectors: How Compilers Can Be Used as an Evasion Technique., , and . DATA, page 203-208. SciTePress, (2019)