Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using genetic algorithms for attribute grouping in multivariate microaggregation., , and . Intell. Data Anal., 18 (5): 819-836 (2014)Graph Representation., , , and . Graph Data Management, IGI Global, (2011)Mistral Supercomputer Job History Analysis., , , and . CoRR, (2018)ENACT: Development, Operation, and Quality Assurance of Trustworthy Smart IoT Systems., , , , , , , , , and . DEVOPS, volume 11350 of Lecture Notes in Computer Science, page 112-127. Springer, (2018)Clustering Software Developer Repository Accesses with the Cophenetic Distance., , , and . SIMPDA, volume 1757 of CEUR Workshop Proceedings, page 100-110. CEUR-WS.org, (2016)Security-Centric Evaluation Framework for IT Services., , , , , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 736-747. (2017)Analyzing the Genetic Operations of an Evolutionary Query Optimizer., , , , and . BNCOD, volume 4042 of Lecture Notes in Computer Science, page 240-244. Springer, (2006)BIBEX: a bibliographic exploration tool based on the DEX graph query engine., , , , , and . EDBT, volume 261 of ACM International Conference Proceeding Series, page 735-739. ACM, (2008)Model-based Privacy-related Continuous Risk Control for Trustworthy Smart IoT Systems., , , and . MDE4IoT/ModComp@MoDELS, volume 2442 of CEUR Workshop Proceedings, page 23-30. CEUR-WS.org, (2019)On Supporting Service Selection for Collaborative Multi-cloud Ecosystems in Community Networks., , , , , and . AINA, page 634-641. IEEE Computer Society, (2015)