Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LimeDS and the TraPIST Project: A Case Study., , , , , , and . KEOD, page 501-508. SciTePress, (2015)978-989-758-158-8.Predicting Train Occupancies based on Query Logs and External Data Sources., , , , , , , and . WWW (Companion Volume), page 1469-1474. ACM, (2017)Modeling wireless shadow networks., and . MSWiM, page 195-202. ACM, (2004)Network Function Virtualization: State-of-the-art and Research Challenges., , , , , and . CoRR, (2015)Scalable dimensioning of optical transport networks for grid excess load handling., , , , , and . Photonic Netw. Commun., 12 (2): 117-132 (2006)FAMOUS: A Network Architecture for Delivering Multimedia Services to FAst MOving USers., , , , , , , , , and 1 other author(s). Wireless Personal Communications, 33 (3-4): 281-304 (2005)Design of wireless mesh networks for aggregating traffic of fast moving users., , , and . MOBIWAC, page 35-44. ACM, (2006)Overly optimistic prediction results on imbalanced data: a case study of flaws and benefits when applying over-sampling, , , , , , , , , and 2 other author(s). Artificial Intelligence in Medicine, (2021)Efficient Resource Allocation through Integer Linear Programming: a detailed example.. CoRR, (2020)Inter-dataset generalization strength of supervised machine learning methods for intrusion detection., , , and . J. Inf. Secur. Appl., (2020)