687 results on '"Böhm, Klemens"'
Search Results
202. PrivEnergy
203. A Query Algebra for Temporal Text Corpora
204. Toward meaningful notions of similarity in NLP embedding models
205. Resources to Examine the Quality of Word Embedding Models Trained on n-Gram Data
206. A Practical Data-Flow Verification Scheme for Business Processes
207. Deploying and Evaluating Pufferfish Privacy for Smart Meter Data (Technical Report '15)
208. A Query Algebra for Temporal Text Corpora.
209. Data mining for defects in multicore applications: an entropy-based call-graph technique
210. On the Usability of a Break-the-Glass Annotation Language for Process Models
211. FRESCO: A Framework for the Energy Estimation of Computers. Extended Version
212. Deploying and Evaluating Pufferfish Privacy for Smart Meter Data (Technical Report)
213. Automatic Generation of Optimized Process Models from Declarative Specifications
214. Towards provable privacy guarantees using rechargeable energy-storage devices
215. Towards Effective Structure-Based Assessment of Proposals and Arguments in Online Deliberation
216. High-throughput crowdsourcing mechanisms for complex tasks
217. Towards Effective Structure-Based Assessment of Arguments and Proposals in Online Deliberation
218. FACTS: A Framework for Anonymity towards Comparability, Transparency, and Sharing (Extended Version)
219. How Much do Digital Natives Disclose on the Internet - a Privacy Study
220. Design and Implementation of a Tool for Peer Assessment
221. Revealing the Suitability of Incentive Mechanisms for the Collaborative Creation of Structured Knowledge
222. A Security Language for BPMN Process Models
223. Embedding 'Break the Glass' into Business Process Models
224. Using Federated Identity Management in a Business-Process-Management System - Requirements, Architecture, and Implementation
225. Efficient Algorithms for a Robust Modularity-Driven Clustering of Attributed Graphs
226. Estimating mutual information on data streams
227. How to quantify the impact of lossy transformations on change detection
228. Towards Efficient Equilibria of Combinations of Network-Formation and Interaction Strategies
229. On the Usefulness of Weight-Based Constraints in Frequent Subgraph Mining
230. Energy-Efficient Processing of Spatio-Temporal Queries in Wireless Sensor Networks. Extended version
231. Towards Scalability of Graph-Mining Based Bug Localisation
232. Auction-based traffic management : towards effective concurrent usage of road intersections
233. Kombiniertes Mining von strukturellen und relationalen Daten
234. Improved Software Fault Detection with Graph Mining
235. Agent-Based Traffic Control Using Auctions
236. Mining Edge-Weighted Call Graphs to Localise Software Bugs
237. Empirical Evaluation of Semi-automated XML Annotation of Text Documents with the GoldenGATE Editor
238. Towards Dependable Agent Systems
239. Privacy2.0: Towards Collaborative Data-Privacy Protection
240. A time-series compression technique and its application to the smart grid
241. Local context selection for outlier ranking in graphs with multiple numeric node attributes
242. Detecting correlated columns in relational databases with mixed data types
243. Erratum to: Unsupervised interaction-preserving discretization of multivariate data
244. Improved bibliographic reference parsing based on repeated patterns
245. Identity business processes
246. Automatic Generation of Optimized Process Models from Declarative Specifications.
247. A parallel document engine built on top of a cluster of databases: Design, implementation, and experiences
248. Specification and Implementation of Aggregation in Graph Query Languages
249. Building a Hybrid Database Application for Structured Documents
250. Efficient and secure exact-match queries in outsourced databases
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.