Author of the publication

Invited Paper: Solutions for a Service Architecture in Pervasive Environments Based on WWRF WG2 Requirements

, , and . International Symposium on Applications and the Internet Workshops, page 1-6. Hiroshima, Japan, IEEE, (January 2007)
DOI: 10.1109/SAINT-W.2007.56

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interactive exploration of interesting findings in the Telecommunication Network Alarm Sequence Analyzer (TASA)., , and . Inf. Softw. Technol., 41 (9): 557-567 (1999)Domain Structures in Filtering Irrelevant Frequent Patterns., and . KDID, page 50-60. Helsinki University Printing House, Helsinki, (2002)Queryable Lossless Log Database Compression., , , and . KDID, page 70-79. Rudjer Boskovic Institute, Zagreb, Croatia, (2003)Knowledge Discovery from Telecommunication Network Alarm Databases., , , , and . ICDE, page 115-122. IEEE Computer Society, (1996)Invited Paper: Solutions for a Service Architecture in Pervasive Environments Based on WWRF WG2 Requirements, , and . International Symposium on Applications and the Internet Workshops, page 1-6. Hiroshima, Japan, IEEE, (January 2007)Querying Inductive Databases: A Case Study on the MINE RULE Operator., , and . PKDD, volume 1510 of Lecture Notes in Computer Science, page 194-202. Springer, (1998)Remarks on the Industrial Application of Inductive Database Technologies., , and . Constraint-Based Mining and Inductive Databases, volume 3848 of Lecture Notes in Computer Science, page 196-215. Springer, (2004)Comprehensive Log Compression with Frequent Patterns., , , , and . DaWaK, volume 2737 of Lecture Notes in Computer Science, page 360-370. Springer, (2003)TASA: Telecommunication Alarm Sequence Analyzer or how to enjoy faults in your network., , , , and . NOMS, page 520-529. IEEE, (1996)Modeling KDD Processes within the Inductive Database Framework., , and . DaWaK, volume 1676 of Lecture Notes in Computer Science, page 293-302. Springer, (1999)