Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Adaptive Machine Learning Algorithm for Location Prediction., , and . Int. J. Wirel. Inf. Networks, 18 (2): 88-99 (2011)Scaling out big data missing value imputations: pythia vs. godzilla., and . KDD, page 651-660. ACM, (2014)A Spatio-Temporal Data Imputation Model for Supporting Analytics at the Edge., , , and . I3E, volume 11701 of Lecture Notes in Computer Science, page 138-150. Springer, (2019)To Transmit or Not to Transmit: Controlling Communications in the Mobile IoT Domain., , , and . ACM Trans. Internet Techn., 20 (3): 22:1-22:23 (2020)Towards QoS-aware Provisioning of Chained Virtual Security Services in Edge Networks., , and . IM, page 178-186. IEEE, (2021)Optimizing Vision Transformers for Medical Image Segmentation., , , , , and . ICASSP, page 1-5. IEEE, (2023)In-Network Decision Making Intelligence for Task Allocation in Edge Computing., and . ICTAI, page 655-662. IEEE, (2018)Context Discovery in Mobile Environments: A Particle Swarm Optimization Approach., and . Autonomics, volume 23 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 160-175. Springer, (2009)In-Network Placement of Security VNFs in Multi-Tenant Data Centers., , and . ISCC, page 1-6. IEEE, (2020)Tuning the Epidemical Algorithm in Wireless Sensor Networks., , and . ICGS3/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 31-37. Springer, (2011)