Author of the publication

The Best of Both Worlds: Challenges in Linking Provenance and Explainability in Distributed Machine Learning.

, , and . ICDCS, page 1620-1629. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advanced Data Management for SQL, NoSQL, Cloud and Distributed Databases. DeGruyter, (2015)Preprocessing for controlled query evaluation in complete first-order databases.. Dortmund University of Technology, (2009)Practical Application of Order-preserving Encryption in Wide Column Stores., , and . SECRYPT, page 352-359. SciTePress, (2016)Inference Control in Logic Databases as a Constraint Satisfaction Problem., , , and . ICISS, volume 4812 of Lecture Notes in Computer Science, page 128-142. Springer, (2007)Implementierung von kryptographischen Sicherheitsverfahren für Apache Cassandra und Apache HBase., and . HMD - Praxis Wirtschaftsinform., 53 (4): 499-513 (2016)Generalizing Conjunctive Queries for Informative Answers., and . FQAS, volume 7022 of Lecture Notes in Computer Science, page 1-12. Springer, (2011)Comparative Evaluation for Recommender Systems for Book Recommendations., , and . BTW (Workshops), volume P-266 of LNI, page 291-300. GI, (2017)Data Analytics with Graph Algorithms - A Hands-on Tutorial with Neo4J.. BTW (Workshops), volume P-290 of LNI, page 259-261. Gesellschaft für Informatik, Bonn, (2019)Combining Consistency and Confidentiality Requirements in First-Order Databases., and . ISC, volume 5735 of Lecture Notes in Computer Science, page 121-134. Springer, (2009)Horizontal Fragmentation and Replication for Multiple Relaxation Attributes.. BICOD, volume 9147 of Lecture Notes in Computer Science, page 157-169. Springer, (2015)