Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards situational pattern mining from microblogging activity., , , , and . WWW (Companion Volume), page 661-666. ACM, (2012)Clustering Analysis for the Management of Self-Monitoring Device Networks., , , and . ICAC, page 55-64. IEEE Computer Society, (2008)Marketing image categorization using hybrid human-machine combinations., and . Imaging and Printing in a Web 2.0 World, volume 8302 of SPIE Proceedings, page 83020Q. SPIE, (2012)An autonomous performance control framework for Distributed Multi-Agent Systems: a queueing theory based approach., , and . AAMAS, page 1313-1314. ACM, (2005)Optimizing Service Level Agreements for Autonomic Cloud Bursting Schedulers., , , and . ICPP Workshops, page 285-294. IEEE Computer Society, (2010)Towards autonomic workload provisioning for enterprise Grids and clouds., , , , and . GRID, page 50-57. IEEE Computer Society, (2009)Autonomic policy adaptation using decentralized online clustering., , , and . ICAC, page 151-160. ACM, (2010)Toward high performance computing in unconventional computing environments., , , and . HPDC, page 627-635. ACM, (2010)Survivability of multi-agent systems.. AAMAS, page 1376. ACM, (2005)Personalized Privacy Policies: Challenges for Data Loss Prevention., and . AAAI Spring Symposium: Intelligent Information Privacy Management, AAAI, (2010)