Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dependability in edge computing., , , and . Commun. ACM, 63 (1): 58-66 (2020)Anomaly Detection through Transfer Learning in Agriculture and Manufacturing IoT Systems., , , , , and . CoRR, (2021)Benchmarking Algorithms for Federated Domain Generalization., , and . CoRR, (2023)Prediction of Resource Availability in Fine-Grained Cycle Sharing Systems Empirical Evaluation., , , and . J. Grid Comput., 5 (2): 173-195 (2007)How to Keep Your Head above Water While Detecting Errors., , , and . Middleware, volume 5896 of Lecture Notes in Computer Science, page 205-225. Springer, (2009)Position statements from panelists: Smart cities-delusions of grandeur.. COMSNETS, page 599-600. IEEE, (2017)Capacity Bounds on Timing Channels with Bounded Service Times., , , and . ISIT, page 981-985. IEEE, (2007)RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network., , and . SECON, page 430-438. IEEE, (2010)GPUMixer: Performance-Driven Floating-Point Tuning for GPU Scientific Applications., , , and . ISC, volume 11501 of Lecture Notes in Computer Science, page 227-246. Springer, (2019)Distributed online channel assignment toward optimal monitoring in multi-channel wireless networks., , and . INFOCOM, page 2626-2630. IEEE, (2012)