Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Storage and Temporal Query Evaluation in Hierarchical Data Archiving Systems., , , and . SSDBM, volume 6809 of Lecture Notes in Computer Science, page 109-128. Springer, (2011)Themis: A participatory navigation system for balanced traffic routing., , , , , , and . VNC, page 159-166. IEEE, (2014)PraDa: Privacy-preserving Data-Deduplication-as-a-Service., , and . CIKM, page 1559-1568. ACM, (2014)Neighborhood prediction based decentralized key management for mobile wireless networks., , , , and . Wireless Networks, 19 (6): 1387-1406 (2013)Illuminating Mario Scenes in the Latent Space of a Generative Adversarial Network., , , , , and . CoRR, (2020)iCoDA: Interactive and exploratory data completeness analysis., , , and . ICDE, page 1226-1229. IEEE Computer Society, (2014)Mutation Testing based Safety Testing and Improving on DNNs., , , , and . QRS, page 821-829. IEEE, (2022)Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers., and . EDBT, volume 360 of ACM International Conference Proceeding Series, page 624-635. ACM, (2009)Investigating Remote Driving over the LTE Network., , , , and . AutomotiveUI, page 264-269. ACM, (2017)Understanding Data Completeness in Network Monitoring Systems., , and . ICDM, page 359-368. IEEE Computer Society, (2012)