Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly detection for big log data using a Hadoop ecosystem., , and . BigComp, page 377-380. IEEE, (2017)Linear Detrending Subsequence Matching in Time-Series Databases, , and . CoRR, (2010)Provenance-based trustworthiness assessment in sensor networks., , and . DMSN, page 2-7. ACM, (2010)Assessing the trustworthiness of location data based on provenance., , , and . GIS, page 276-285. ACM, (2009)An Efficient Algorithm for Computing Range-Groupby Queries., , , , and . DASFAA, volume 3882 of Lecture Notes in Computer Science, page 483-497. Springer, (2006)Performance Analysis of Hadoop-Based SQL and NoSQL for Processing Log Data., , , and . DASFAA Workshops, volume 9052 of Lecture Notes in Computer Science, page 293-299. Springer, (2015)Measurement Noise Recommendation for Efficient Kalman Filtering over a Large Amount of Sensor Data., , , and . Sensors, 19 (5): 1168 (2019)Fast Computation of Rotation-Invariant Distances for Image Time-Series Data., , and . ICHIT (1), volume 7425 of Lecture Notes in Computer Science, page 516-524. Springer, (2012)SPMgr: Dynamic workflow manager for sampling and filtering data streams over Apache Storm., , and . IJDSN, (2019)Experimental Comparison of Machine Learning Models in Malware Packing Detection., , , and . APNOMS, page 377-380. IEEE, (2020)