Author of the publication

A Big Data Architecture for Near Real-time Traffic Analytics.

, , and . UCC (Companion"), page 157-162. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security-enabled Enactment of Decentralized Workflows., , and . SIN, page 49-56. ACM, (2016)Modelling Dynamic Distributed Systems in LOTOS.. FBT, page 203-212. Herbert Utz Verlag, (1999)Towards Decentralised Security Policies for e-Health Collaborations., , and . SECURWARE, page 165-172. IEEE Computer Society, (2008)Security-oriented Portals for the Life Sciences., , , , , and . IWPLS, volume 513 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)Identifying lameness in horses through deep learning., , , and . SAC, page 976-985. ACM, (2021)Linking User Accounts across Social Media Platforms., and . BDCAT, page 18-27. ACM, (2021)Fake News Detection Through Temporally Evolving User Interactions., , , and . PAKDD (4), volume 13938 of Lecture Notes in Computer Science, page 137-148. Springer, (2023)The Impact of General Data Protection Regulation on the Australasian Type-1 Diabetes Platform., , , and . CBMS, page 205-210. IEEE, (2022)A Semantic-Based K-Anonymity Scheme for Health Record Linkage., , and . HIC, volume 239 of Studies in Health Technology and Informatics, page 84-90. IOS Press, (2017)Prediction of Air Pollution through Machine Learning Approaches on the Cloud., and . BDCAT, page 51-60. IEEE Computer Society, (2018)