Author of the publication

Proactive Learning from SLA Violation in Cloud Service based Application.

, , , , and . CLOSER (1), page 186-193. SciTePress, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Early Experience with Recursion Optimization in an Extensible Rewriter., and . Australian Database Conference, page 262-273. World Scientific, (1993)Querying Future Telecommunication Networks., , and . CIKM, page 226-233. ACM, (1998)Query Processing in IRO-DB., , and . DOOD, volume 1013 of Lecture Notes in Computer Science, page 299-318. Springer, (1995)CMIS-L: A Query Language for Telecommunication Management Systems., and . Proc. 15èmes Journées Bases de Données Avancées, BDA, page 119-137. Actes, (1999)A Fuzzy Semantic CEP Model for Situation Identification in Smart Homes., , , , , and . ECAI, volume 285 of Frontiers in Artificial Intelligence and Applications, page 1678-1679. IOS Press, (2016)Towards an Ambient Data Mediation System., , and . IMMoA, volume 908 of CEUR Workshop Proceedings, page 13-20. CEUR-WS.org, (2012)Génération de wrappers LDAP pour sources de données relationnelles., and . BDA, (2001)A Multi-Level Logic Programming Model of a Query Optimizer., , and . ADBIS, page 90-96. Nevsky Dialect, (1997)A Causal Multi-armed Bandit Approach for Domestic Robots' Failure Avoidance., , and . ICONIP (6), volume 10639 of Lecture Notes in Computer Science, page 90-99. Springer, (2017)Towards an Autonomous Radiation Early Warning System., , , , and . BDCSIntell, volume 2622 of CEUR Workshop Proceedings, page 57-63. CEUR-WS.org, (2019)