Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HiDER: Query-Driven Entity Resolution for Historical Data, , , , , , and . European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), (2015)Discovering Roll-Up Dependencies., , and . KDD, page 213-222. ACM, (1999)Recent Developments in Pattern Mining.. ALT, volume 7568 of Lecture Notes in Computer Science, page 34. Springer, (2012)Maintaining Sliding-Window Neighborhood Profiles in Interaction Networks., , , and . ECML/PKDD (2), volume 9285 of Lecture Notes in Computer Science, page 719-735. Springer, (2015)Online Risk Prediction for Indoor Moving Objects., , , and . MDM, page 102-111. IEEE Computer Society, (2016)Keeping the Data Lake in Form: DS-kNN Datasets Categorization Using Proximity Mining., , , and . MEDI, volume 11815 of Lecture Notes in Computer Science, page 35-49. Springer, (2019)Incremental Predictive Process Monitoring: The Next Activity Case., and . BPM, volume 12875 of Lecture Notes in Computer Science, page 123-140. Springer, (2021)Using minimum description length for process mining., , , and . SAC, page 1451-1455. ACM, (2009)A novel hierarchical-based framework for upper bound computation of graph edit distance., , and . Pattern Recognit., (2018)How to be fair? A study of label and selection bias., , , and . CoRR, (2024)