Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NFV-driven intrusion detection for smart manufacturing., , , , , , , , and . NFV-SDN, page 1-6. IEEE, (2019)Use What You Know: Network and Service Coordination Beyond Certainty., , and . NOMS, page 1-10. IEEE, (2022)Sketch Learning by Analogy., , , , , , , and . SHAPES, volume 1007 of CEUR Workshop Proceedings, page 49-58. CEUR-WS.org, (2013)Dynamic Assembly of Figures in Visuospatial Reasoning., , and . SHAPES, volume 1007 of CEUR Workshop Proceedings, page 137-141. CEUR-WS.org, (2013)Conventional and Machine Learning Approaches for Network and Service Coordination.. NFV-SDN, page 201-206. IEEE, (2023)Every Node for Itself: Fully Distributed Service Coordination., , and . CNSM, page 1-9. IEEE, (2020)Deep Learning Object Detection Methods for Ecological Camera Trap Data., , and . CRV, page 321-328. IEEE Computer Society, (2018)On Structural Identification of 2D Regression Functions for Indoor Bluetooth Localization., , , , and . EUROCAST, volume 5717 of Lecture Notes in Computer Science, page 801-808. Springer, (2009)Transformer-based nowcasting of radar composites from satellite images for severe weather., , , and . CoRR, (2023)Nondeterministic Extensions of the Strong Exponential Time Hypothesis and Consequences for Non-reducibility., , , , , and . ITCS, page 261-270. ACM, (2016)