Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Profile-aware Daily Activity Prediction., , , , and . DSP, page 1-5. IEEE, (2023)A light-weighted ANN architecture for the classification of cyber-threats in modern communication networks., , , and . NOF, page 17-24. IEEE, (2019)A Demonstration of the BigDAWG Polystore System, , , , , , , , , and 8 other author(s). PVLDB, 8 (12): 1908--1911 (2015)Differentially Private Histograms for Range-Sum Queries: A Modular Approach., , and . CoRR, (2015)An Emerging Role for Polystores in Precision Medicine., , , and . DMAH@VLDB, volume 10494 of Lecture Notes in Computer Science, page 41-52. Springer, (2017)Continuous Medoid Queries over Moving Objects., , and . SSTD, volume 4605 of Lecture Notes in Computer Science, page 38-56. Springer, (2007)AI-enabled Underground Water Pipe non -destructive Inspection., , , , , and . Multim. Tools Appl., 83 (6): 18309-18332 (February 2024)IoT threat mitigation engine empowered by artificial intelligence multi-objective optimization., , , and . J. Netw. Comput. Appl., (2022)A graph neural network method for distributed anomaly detection in IoT., , , , and . Evol. Syst., 12 (1): 19-36 (2021)Nearest keyword search in XML documents., , , and . SIGMOD Conference, page 589-600. ACM, (2011)