Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy and Trust in the Internet of Vehicles., , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (8): 10126-10141 (2022)Efficient and adaptive incentive selection for crowdsourcing contests., , , , and . Appl. Intell., 53 (8): 9204-9234 (April 2023)Post-lockdown abatement of COVID-19 by fast periodic switching., , , , , , , , , and 1 other author(s). PLoS Comput. Biol., (2021)User-adaptive models for recognizing food preparation activities., and . CEA@ACM Multimedia, page 39-44. ACM, (2013)Online Resource Allocation in Edge Computing Using Distributed Bidding Approaches., , , , and . MASS, page 225-233. IEEE, (2021)Competitive Influence Maximisation with Nonlinear Cost of Allocations., and . CSoNet, volume 13831 of Lecture Notes in Computer Science, page 247-258. Springer, (2022)An Empirical Evaluation of Selfish Mining and Strategic Mining in Proof-of-Work Blockchain with Multiple Miners., , , and . CoRR, (2019)Compliance Management auf Basis von semantischen Richtlinien, and . volume XI of Leipziger Beiträge zur Informatik, Eigenverlag Leipziger Informatik-Verbund (LIV), Leipzig, (September 2008)Towards a Framework for Semantic Business Process Compliance Management, , , and . (2007)Business to IT Transformations, , and . (2008)