Author of the publication

D ^2 2 IA: Stream Analytics on User-Defined Event Intervals.

, , , , and . CAiSE, volume 11483 of Lecture Notes in Computer Science, page 346-361. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Enclave for TLS Web Server on Untrusted Environment., , , , , and . ICCNS, page 27-31. ACM, (2017)A Fast Process-Variation-Aware Mask Optimization Algorithm With a Novel Intensity Modeling., , , and . IEEE Trans. Very Large Scale Integr. Syst., 25 (3): 998-1011 (2017)A Fast Mask Manufacturability and Process Variation Aware OPC Algorithm with Exploiting a Novel Intensity Estimation Model., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (12): 2363-2374 (2016)Visual suggestions for improvements in business process diagrams., and . J. Vis. Lang. Comput., 22 (5): 385-399 (2011)Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification Methods., , , and . ISDDC, volume 11317 of Lecture Notes in Computer Science, page 38-49. Springer, (2018)D2IA: User-defined interval analytics on distributed streams., , , , , and . Inf. Syst., (2022)Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords., , and . Secur. Priv., (2019)Reversible Logic Synthesis Using Binary Decision Diagrams With Exploiting Efficient Reordering Operators., , and . IEEE Access, (2020)C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments., , , and . CAiSE, volume 13901 of Lecture Notes in Computer Science, page 437-453. Springer, (2023)A Decentralised Public Key Infrastructure for X-Road., , , , and . ARES, page 128:1-128:8. ACM, (2023)