Author of the publication

Service-Oriented Data Processing for Dynamic Schema.

, , , , , and . KES, volume 192 of Procedia Computer Science, page 3856-3864. Elsevier, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gaussian-Process-Based Demand Forecasting for Predictive Control of Drinking Water Networks., , , and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 69-80. Springer, (2014)Zonotopic fault detection observer design for Takagi-Sugeno fuzzy systems., , , and . Int. J. Systems Science, 49 (15): 3216-3230 (2018)Application of a content-based percussive sound synthesizer to packet loss recovery in music streaming., , and . ACM Multimedia, page 335-338. ACM, (2003)Quantifying Lexical Novelty in Song Lyrics., , , and . ISMIR, page 694-700. (2015)Multiple-Feature Fusion Based Onset Detection for Solo Singing Voice., , and . ISMIR, page 515-520. (2008)RobustPointSet: A Dataset for Benchmarking Robustness of Point Cloud Classifiers, , , , , and . (2020)cite arxiv:2011.11572Comment: Published at the Robust and Reliable Machine Learning in the Real World Workshop, ICLR 2021.Constructions of linear codes with small hulls from association schemes., and . Adv. Math. Commun., 16 (2): 349-364 (2022)On unconditionally secure multiparty computation for realizing correlated equilibria in games., , and . GlobalSIP, page 241-244. IEEE, (2013)Translating sEMG signals to continuous hand poses using recurrent neural networks., , , and . BHI, page 166-169. IEEE, (2018)Bootstrapped oblivious transfer and secure two-party function computation., and . ISIT, page 1303-1307. IEEE, (2009)