Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Evaluation of a Genomics Variant Analysis Pipeline Using GATK Spark Tools., , , and . SEBD, volume 2161 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Recruiting from the Network: Discovering Twitter Users Who Can Help Combat Zika Epidemics., , , , , , , and . ICWE, volume 10360 of Lecture Notes in Computer Science, page 437-445. Springer, (2017)Why-Diff: Explaining differences amongst similar workflow runs by exploiting scientific metadata., , and . IEEE BigData, page 3031-3041. IEEE Computer Society, (2017)Workload-aware Streaming Graph Partitioning., and . EDBT/ICDT Workshops, volume 1558 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Analyzing Social Network Images with Deep Learning Models to Fight Zika Virus., , , , , and . ICIAR, volume 10882 of Lecture Notes in Computer Science, page 605-610. Springer, (2018)Access control and view generation for provenance graphs., , , and . Future Gener. Comput. Syst., (2015)Selective and Recurring Re-computation of Big Data Analytics Tasks: Insights from a Genomics Case Study., and . Big Data Res., (2018)Extending Semantic Provenance into the Web of Data., , , , and . IEEE Internet Comput., 15 (1): 40-48 (2011)Modelling Provenance Using Structured Occurrence Networks., , and . IPAW, volume 7525 of Lecture Notes in Computer Science, page 183-197. Springer, (2012)Why-Diff: Exploiting Provenance to Understand Outcome Differences From Non-Identical Reproduced Workflows., , and . IEEE Access, (2019)