Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EDEN: Enforcing Location Privacy through Re-identification Risk Assessment: A Federated Learning Approach., , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 5 (2): 68:1-68:25 (2021)Automated control for SLA-aware elastic clouds.. FeBiD@EuroSys, page 27-28. ACM, (2010)Dynamic Modeling of Location Privacy Protection Mechanisms., , , , and . DAIS, volume 10853 of Lecture Notes in Computer Science, page 26-39. Springer, (2018)Fluid modeling and control for server system performance and availability., , and . DSN, page 389-398. IEEE Computer Society, (2009)Cost function based event triggered Model Predictive Controllers application to Big Data Cloud services., , , , and . CDC, page 1657-1662. IEEE, (2016)Modeling and control of server systems: Application to database systems., , and . ECC, page 2960-2965. IEEE, (2009)Adaptive Middleware for Message Queuing Systems., , and . Encyclopedia of Database Systems, Springer US, (2009)A Control-Theoretic Approach for Location Privacy in Mobile Applications., , , , and . CCTA, page 1488-1493. IEEE, (2018)Towards Robust and Bias-free Federated Learning., and . EuroMLSys@EuroSys, page 49-55. ACM, (2023)Exploratory Study of Privacy Preserving Fraud Detection., , , , , and . Middleware Industry, page 25-31. ACM, (2018)