Author of the publication

Improving Hearing Healthcare with Big Data Analytics of Real-Time Hearing Aid Data.

, , , , and . SERVICES, page 307-313. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ASSERT4SOA: Toward Security Certification of Service-Oriented Applications., , , , , , , , , and . OTM Workshops, volume 6428 of Lecture Notes in Computer Science, page 38-40. Springer, (2010)A Knowledge-Based IoT Security Checker., , , , , and . Euro-Par Workshops, volume 11339 of Lecture Notes in Computer Science, page 299-311. Springer, (2018)Glare removal as an ill-conditioned problem., , , , and . J. Electronic Imaging, 28 (6): 063014 (2019)A trusted medical image super-resolution method based on feedback adaptive weighted dense network., , , , and . Artif. Intell. Medicine, (2020)Continuous Certification of Non-functional Properties Across System Changes., , and . ICSOC (1), volume 14419 of Lecture Notes in Computer Science, page 3-18. Springer, (2023)An Assurance Framework and Process for Hybrid Systems., , , and . ICETE (Selected Papers), volume 1484 of Communications in Computer and Information Science, page 79-101. Springer, (2020)Toward Security and Performance Certification of Open Stack., , , , and . CLOUD, page 564-571. IEEE Computer Society, (2015)Managing ML-Based Application Non-Functional Behavior: A Multi-Model Approach., , , , and . CoRR, (2023)MUSA: A Platform for Data-Intensive Services in Edge-Cloud Continuum., , , , , , , , and . AINA (5), volume 203 of Lecture Notes on Data Engineering and Communications Technologies, page 327-337. Springer, (2024)A Methodology for Web Cache Deception Vulnerability Discovery., , , and . CLOSER, page 231-238. SCITEPRESS, (2024)