Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-based long running negotiations., , , and . Digital Identity Management, page 97-106. ACM, (2008)Computing Multi-Modal Journey Plans under Uncertainty., , , , , and . J. Artif. Intell. Res., (2019)DLPFS: The Data Leakage Prevention FileSystem., , and . ACNS Workshops, volume 13285 of Lecture Notes in Computer Science, page 380-397. Springer, (2022)S&P360: Multidimensional Perspective on Companies from Online Data Sources., , , , , , , and . ECML/PKDD (3), volume 9286 of Lecture Notes in Computer Science, page 320-324. Springer, (2015)Robust Learning Protocol for Federated Tumor Segmentation Challenge., , , , and . BrainLes@MICCAI (2), volume 14092 of Lecture Notes in Computer Science, page 183-195. Springer, (2022)Secure and Policy-Private Resource Sharing in an Online Social Network., , , and . SocialCom/PASSAT, page 872-875. IEEE Computer Society, (2011)SWAT: Social Web Application for Team Recommendation., , , and . ICPADS, page 845-850. IEEE Computer Society, (2012)Contingent versus Deterministic Plans in Multi-Modal Journey Planning., and . ICAPS, page 268-272. AAAI Press, (2015)The Bounded Laplace Mechanism in Differential Privacy., , , and . CoRR, (2018)Answering queries using pairings., , and . CoRR, (2014)