Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated morphometric characterization of cardiac fibers by second harmonic microscopy imaging., , , , , , , and . ISBI, page 1379-1382. IEEE, (2011)Callibration procedure and characterization of a commercial multiphoton microscope to measure Polarization Second Harmonic Generation microscopy., , , , , and . ISBI, page 1296-1299. IEEE, (2012)Orfeon: An AIOps framework for the goal-driven operationalization of distributed analytical pipelines., , , and . Future Gener. Comput. Syst., (2023)Pangea: An MLOps Tool for Automatically Generating Infrastructure and Deploying Analytic Pipelines in Edge, Fog and Cloud Layers., , , and . Sensors, 22 (12): 4425 (2022)Technological Perspective of Data Governance in Data Space Ecosystems., , , and . Data Spaces, Springer, (2022)K2E: Building MLOps Environments for Governing Data and Models Catalogues while Tracking Versions., , , and . ICSA Companion, page 206-209. IEEE, (2022)Intelligent SPARQL Endpoints: Optimizing Execution Performance by Automatic Query Relaxation and Queue Scheduling., , , and . ICA3PP, volume 10048 of Lecture Notes in Computer Science, page 3-17. Springer, (2016)Concept Tracking and Adaptation for Drifting Data Streams under Extreme Verification Latency., , , , and . IDC, volume 798 of Studies in Computational Intelligence, page 11-25. Springer, (2018)Semantic Information Fusion of Linked Open Data and Social Big Data for the Creation of an Extended Corporate CRM Database., , , and . IDC, volume 570 of Studies in Computational Intelligence, page 211-221. Springer, (2014)A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines., , , , and . Concurr. Comput. Pract. Exp., 28 (4): 1385-1395 (2016)