Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TMIXT: A process flow for Transcribing MIXed handwritten and machine-printed Text., , , , , , , , and . CoRR, (2019)IoT European Security and Privacy Projects: Integration, Architectures and Interoperability, , , , , , , , , and 53 other author(s). chapter 7, page 237--248. River Publishers, (2018)SMS Spam Filtering Using Probabilistic Topic Modelling and Stacked Denoising Autoencoder., , , and . ICANN (2), volume 9887 of Lecture Notes in Computer Science, page 423-430. Springer, (2016)Security-Centric Evaluation Framework for IT Services., , , , , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 736-747. (2017)How do school leaders successfully lead learning?. National College for School Leadership, (2009)A slowly mixing Markov chain with implications for Gibbs sampling. Statistics & Probability Letters, 17 (3): 231--236 (Jun 18, 1993)On Supporting Service Selection for Collaborative Multi-cloud Ecosystems in Community Networks., , , , , and . AINA, page 634-641. IEEE Computer Society, (2015)Data Is the New Currency., and . NSPW, page 105-116. ACM, (2014)Applications of ML-Based Surrogates in Bayesian Approaches to Inverse Problems., , , , , and . CoRR, (2023)TMIXT: A process flow for Transcribing MIXed handwritten and machine-printed Text., , , , , , , , and . IEEE BigData, page 2986-2994. IEEE, (2018)