Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Event Log Event Attributes in RNN Based Prediction., , and . ADBIS (Short Papers and Workshops), volume 1064 of Communications in Computer and Information Science, page 405-416. Springer, (2019)Preface., , , and . PASM/PDMC, volume 296 of Electronic Notes in Theoretical Computer Science, page 1-5. Elsevier, (2012)Access Time Improvement Framework for Standardized IoT Gateways., , , , and . PerCom Workshops, page 220-226. IEEE, (2019)Scalable Reference Genome Assembly from Compressed Pan-Genome Index with Spark., , , , and . BigData, volume 12402 of Lecture Notes in Computer Science, page 68-84. Springer, (2020)IoTEF: A Federated Edge-Cloud Architecture for Fault-Tolerant IoT Applications., , , and . J. Grid Comput., 18 (1): 57-80 (2020)BMC with Memory Models as Modules., , , and . FMCAD, page 1-9. IEEE, (2018)Reinforcement learning of adaptive online rescheduling timing and computing time allocation., , and . Comput. Chem. Eng., (2020)Model checking of safety-critical software in the nuclear engineering domain., , , , , and . Reliab. Eng. Syst. Saf., (2012)Dartagnan: Bounded Model Checking for Weak Memory Models (Competition Contribution)., , , and . TACAS (2), volume 12079 of Lecture Notes in Computer Science, page 378-382. Springer, (2020)When Do We (Not) Need Complex Assume-Guarantee Rules?, , and . ACSD, page 30-39. IEEE Computer Society, (2015)