Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Profile-aware Daily Activity Prediction., , , , and . DSP, page 1-5. IEEE, (2023)A light-weighted ANN architecture for the classification of cyber-threats in modern communication networks., , , and . NOF, page 17-24. IEEE, (2019)Differentially Private Histograms for Range-Sum Queries: A Modular Approach., , and . CoRR, (2015)A Demonstration of the BigDAWG Polystore System, , , , , , , , , and 8 other author(s). PVLDB, 8 (12): 1908--1911 (2015)Continuous Medoid Queries over Moving Objects., , and . SSTD, volume 4605 of Lecture Notes in Computer Science, page 38-56. Springer, (2007)An Emerging Role for Polystores in Precision Medicine., , , and . DMAH@VLDB, volume 10494 of Lecture Notes in Computer Science, page 41-52. Springer, (2017)IoT threat mitigation engine empowered by artificial intelligence multi-objective optimization., , , and . J. Netw. Comput. Appl., (2022)A graph neural network method for distributed anomaly detection in IoT., , , , and . Evol. Syst., 12 (1): 19-36 (2021)Nearest keyword search in XML documents., , , and . SIGMOD Conference, page 589-600. ACM, (2011)Authenticated join processing in outsourced databases., , , and . SIGMOD Conference, page 5-18. ACM, (2009)