Author of the publication

Bridging DataOps and MLOps --- towardsdatascience.com

. https://towardsdatascience.com/bridging-dataops-mlops-301f010caf30, (2022)[Accessed 09-May-2023].

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Comparison of Secure Comparison Protocols., , and . DEXA Workshops, page 133-136. IEEE Computer Society, (2009)Conflict Detection and Lifecycle Management for Access Control in Publish/Subscribe Systems., , , and . HASE, page 104-111. IEEE Computer Society, (2011)Distributed Usage Control., , and . ANT/MobiWIS, volume 5 of Procedia Computer Science, page 562-569. Elsevier, (2011)Spheres of Visibility., and . ECOWS, page 2-13. IEEE Computer Society, (2005)Active XML Replication and Recovery.. CISIS, page 263-269. (2008)Privacy Preserving Cloud Transactions., and . OTM Conferences (2), volume 7566 of Lecture Notes in Computer Science, page 511-526. Springer, (2012)Privacy preserving minimal observability for composite transactional services., and . Discrete Event Dynamic Systems, 24 (4): 611-646 (2014)Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination., , and . HASE, page 97-106. IEEE Computer Society, (2008)On the practical importance of communication complexity for secure multi-party computation protocols., , , and . SAC, page 2008-2015. ACM, (2009)Modeling Visibility in Hierarchical Systems., and . ER, volume 4215 of Lecture Notes in Computer Science, page 155-167. Springer, (2006)