Author of the publication

A finite state machine-based characterization of building entities for monitoring and control.

, , , , and . BuildSys@SenSys, page 153-160. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bellala, Gowtham
add a person with the name Bellala, Gowtham
 

Other publications of authors with the same name

A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics., , and . SACMAT, page 219-230. ACM, (2017)How cytokines co-occur across asthma patients: From bipartite network analysis to a molecular-based classification., , , , , , , , , and 1 other author(s). J. Biomed. Informatics, 44 (Supplement-1): S24-S30 (2011)Privacy-Preserving Multi-Party Clustering: An Empirical Study., and . CLOUD, page 326-333. IEEE Computer Society, (2017)Group-based Query Learning for rapid diagnosis in time-critical situations, , and . CoRR, (2009)The role of complementary bipartite visual analytical representations in the analysis of SNPs: a case study in ancestral informative markers., , , , and . JAMIA, (2012)Extensions of Generalized Binary Search to Group Identification and Exponential Costs., , and . NIPS, page 154-162. Curran Associates, Inc., (2010)Vicinity Exploration: Enabling User-Driven Visual Search of Multiple Machine Learning Models for Precision Medicine., , , , , and . AMIA, AMIA, (2017)Query Learning with Exponential Query Costs, , and . CoRR, (2010)Active Diagnosis under Persistent Noise with Unknown Noise Distribution: A Rank-Based Approach., , and . AISTATS, volume 15 of JMLR Proceedings, page 155-163. JMLR.org, (2011)Application-awareness in SDN., , , , , and . SIGCOMM, page 487-488. ACM, (2013)