Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Many Faces of Data-centric Workflow Optimization: A Survey., , and . CoRR, (2017)Self-optimizing block transfer in web service grids., , , and . WIDM, page 49-56. ACM, (2007)Spark Parameter Tuning via Trial-and-Error., , and . INNS Conference on Big Data, volume 529 of Advances in Intelligent Systems and Computing, page 226-237. (2016)A hybrid ontology and visual-based retrieval model for cultural heritage multimedia collections., , , , , and . IJMSO, 3 (3): 167-182 (2008)Speeding-up the Verification Phase of Set Similarity Joins in the GPGPU paradigm., and . CoRR, (2018)Security-aware elasticity for NoSQL databases in multi-cloud environments., , , and . Int. J. Intell. Inf. Database Syst., 10 (3/4): 168-190 (2017)Detecting Anomalous Behavior Towards Predictive Maintenance., , , and . CAiSE Workshops, volume 349 of Lecture Notes in Business Information Processing, page 73-82. Springer, (2019)Adaptive filter ordering in Spark., and . CoRR, (2019)Detecting Temporal Anomalies in Business Processes Using Distance-Based Methods., and . DS, volume 12323 of Lecture Notes in Computer Science, page 615-629. Springer, (2020)Data Base Management Systems (DBMSs): Meeting the requirements of the EU data protection legislation., and . Int. J. Inf. Manag., 23 (3): 185-199 (2003)