Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantic Analysis of E-Business Operations., , , and . J. Netw. Syst. Manag., 11 (1): 13-37 (2003)Distributed Web Log Mining Using Maximal Large Itemsets., and . Knowl. Inf. Syst., 3 (4): 389-404 (2001)Automated SLA Monitoring for Web Services., , , , and . DSOM, volume 2506 of Lecture Notes in Computer Science, page 28-41. Springer, (2002)Content Replication in Web++., , and . NCA, page 33-42. IEEE Computer Society, (2003)Time series data analysis in multiple granularity levels., and . Int. J. Granul. Comput. Rough Sets Intell. Syst., 1 (1): 64-80 (2009)Data engineering issues in e-commerce and services: DEECS 2007 workshop summary., , , , and . DEECS, volume 236 of ACM International Conference Proceeding Series, page 1-3. ACM, (2007)Privately detecting bursts in streaming, distributed time series data., and . Data Knowl. Eng., 68 (6): 509-530 (2009)Analysis of numeric data streams at different granularities., and . GrC, page 237-242. IEEE, (2005)SHARD: A Framework for Sequential, Hierarchical Anomaly Ranking and Detection., , , , and . PAKDD (2), volume 7302 of Lecture Notes in Computer Science, page 243-255. Springer, (2012)Bidding Languages and Supplier Selection for Procurement Markets with Economies of Scale and Scope., , , and . CEC, page 1-7. IEEE Computer Society, (2009)