Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Top-k Maximal Influential Paths in Network Data., , , and . DEXA (1), volume 7446 of Lecture Notes in Computer Science, page 369-383. Springer, (2012)Inferring Topic-Level Influence from Network Data., , , and . DEXA (2), volume 8645 of Lecture Notes in Computer Science, page 131-146. Springer, (2014)Efficient Mining of Lag Patterns in Evolving Time Series., , and . Trans. Large Scale Data Knowl. Centered Syst., (2013)Keeping Master Green at Scale., , , , , , and . EuroSys, page 29:1-29:15. ACM, (2019)Detecting click fraud in online advertising: a data mining approach., , , , , , , , , and 8 other author(s). J. Mach. Learn. Res., 15 (1): 99-140 (2014)Time Series Clustering for Human Behavior Pattern Mining., , , and . CoRR, (2021)A Transformer-based Framework for Multivariate Time Series Representation Learning., , , , and . CoRR, (2020)Spatial Co-location Pattern Mining - A new perspective using Graph Database., , and . CoRR, (2018)Mobile health application for early disease outbreak-period detection., , , and . Healthcom, page 483-488. IEEE, (2014)Asset Modeling using Serverless Computing., , , , , and . IEEE BigData, page 4084-4090. IEEE, (2021)