Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events From Intelligent Transportation Systems., , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (7): 4507-4518 (2021)Data Curation APIs., , , and . CoRR, (2016)Scalable graph-based OLAP analytics over process execution data., , and . Distributed Parallel Databases, 34 (3): 379-423 (2016)DataSynapse: A Social Data Curation Foundry., , , , , and . Distributed Parallel Databases, 37 (3): 351-384 (2019)An Analytic Approach to People Evaluation in Crowdsourcing Systems, , , , , and . CoRR, (2012)Correction To: Large scale graph processing systems: survey and an experimental evaluation., , , , , , and . Clust. Comput., 21 (2): 1455 (2018)Organizing, querying, and analyzing ad-hoc processes' data.. University of New South Wales, Sydney, Australia, (2012)iSheets: A Spreadsheet-Based Machine Learning Development Platform for Data-Driven Process Analytics., , , , , and . ICSOC Workshops, volume 11434 of Lecture Notes in Computer Science, page 453-457. Springer, (2018)A Contextualized Transformer-Based Method for Cyberbullying Detection., , and . DSAA, page 1-10. IEEE, (2023)FRAUDRE: Fraud Detection Dual-Resistant to Graph Inconsistency and Imbalance., , , , , , and . ICDM, page 867-876. IEEE, (2021)