Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing Security Objects and -Processes Using an Extended BPM Approach and -System., , , , , and . EDOC, page 197-205. IEEE, (2019)Automating privacy compliance in the decentralized enterprise., , , and . IEEE Big Data, page 2218-2223. IEEE, (2022)A JC-BioAPI Compliant Smart Card with Biometrics for Secure Access Control., and . AVBPA, volume 2688 of Lecture Notes in Computer Science, page 903-910. Springer, (2003)Problems in price theory, and . Allan, Oxford, (1980)The Future of Employment: How susceptible are jobs to computerisation?, and . Online PDF, (Sep 17, 2013)Periodicity of the parity of a partition function related to making change., and . Math. Comput., 77 (263): 1749-1754 (2008)Radial Bayesian Neural Networks: Beyond Discrete Support In Large-Scale Bayesian Deep Learning, , and . (2019)cite arxiv:1907.00865.Integrated Multimedia City Data (iMCD): A composite survey and sensing approach to understanding urban living and mobility., , , , , , and . Comput. Environ. Urban Syst., (2020)Identifying Sources of Discrimination Risk in the Life Cycle of Machine Intelligence Applications under New European Union Regulations., , , , , , and . AAAI Spring Symposia, AAAI Press, (2017)VBALD - Variational Bayesian Approximation of Log Determinants., , , , and . CoRR, (2018)