Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying resources for cloud garbage collection., , , , and . CNSM, page 248-252. IEEE, (2016)Improving Recall of Regular Expressions for Information Extraction., , and . WISE, volume 7651 of Lecture Notes in Computer Science, page 455-467. Springer, (2012)Exploiting Evidence from Unstructured Data to Enhance Master Data Management., , , , , , , and . PVLDB, 5 (12): 1862-1873 (2012)Towards establishing causality between change and incident., , , and . NOMS, page 937-942. IEEE, (2016)The Mask of ZoRRo: preventing information leakage from documents., , , , , and . Knowl. Inf. Syst., 45 (3): 705-730 (2015)Automatically Generating Term Frequency Induced Taxonomies., , , , and . ACL (Short Papers), page 126-131. The Association for Computer Linguistics, (2010)BizMap: A framework for mapping business applications to IT infrastructure., , , , and . IM, page 1377-1383. IEEE, (2015)Configurable and Extensible Multi-flows for Providing Analytics as a Service on the Cloud., , and . SRII Global Conference, page 1-10. IEEE Computer Society, (2012)DUST: a generalized notion of similarity between uncertain time series., and . KDD, page 383-392. ACM, (2010)COACH: Cognitive analytics for change., , , , and . IM, page 720-725. IEEE, (2017)