


Остановите войну!
for scientists:


default search action
Klemens Böhm
Person information

- affiliation: Karlsruhe Institute of Technology, IPD, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j69]Elaheh Ordoni
, Jutta A. Mülle
, Klemens Böhm:
Reduction of data-value-aware process models: A relevance-based approach. Inf. Syst. 114: 102157 (2023) - [i15]Marco Heyden, Vadim Arzamasov, Edouard Fouché, Klemens Böhm:
Budgeted Multi-Armed Bandits with Asymmetric Confidence Intervals. CoRR abs/2306.07071 (2023) - [i14]Marco Heyden, Edouard Fouché, Vadim Arzamasov, Tanja Fenn, Florian Kalinke, Klemens Böhm:
Adaptive Bernstein Change Detector for High-Dimensional Data Streams. CoRR abs/2306.12974 (2023) - [i13]Federico Matteucci, Vadim Arzamasov, Klemens Böhm:
A benchmark of categorical encoders for binary classification. CoRR abs/2307.09191 (2023) - 2022
- [j68]Mirela T. Cazzolato
, Agma J. M. Traina
, Klemens Böhm:
Establishing trajectories of moving objects without identities: The intricacies of cell tracking and a solution. Inf. Syst. 105: 101955 (2022) - [j67]Christine Tex
, Martin Schäler
, Klemens Böhm:
Swellfish privacy: Supporting time-dependent relevance for continuous differential privacy. Inf. Syst. 109: 102079 (2022) - [j66]Adrian Englhardt
, Holger Trittenbach, Daniel Kottke, Bernhard Sick, Klemens Böhm:
Efficient SVDD sampling with approximation guarantees for the decision boundary. Mach. Learn. 111(4): 1349-1375 (2022) - [j65]Jakob Bach
, Kolja Zoller, Holger Trittenbach, Katrin Schulz, Klemens Böhm:
An Empirical Evaluation of Constrained Feature Selection. SN Comput. Sci. 3(6): 445 (2022) - [c184]Elaheh Ordoni, Jutta A. Mülle, Klemens Böhm:
Results from the Verification of Models of Spectrum Auctions. BMSD 2022: 54-68 - [c183]Jakob Bach
, Markus Iser, Klemens Böhm:
A Comprehensive Study of k-Portfolios of Recent SAT Solvers. SAT 2022: 2:1-2:18 - [c182]Elaheh Ordoni, Jutta A. Mülle, Kuan Yang, Klemens Böhm:
Efficient Verification of Process Models Supporting Modifications of Data Values. CBI (1) 2022: 21-30 - [i12]Florian Kalinke, Marco Heyden, Edouard Fouché, Klemens Böhm:
Scalable Online Change Detection for High-dimensional Data Streams. CoRR abs/2205.12706 (2022) - 2021
- [j64]Gabriela Suntaxi
, Aboubakr Achraf El Ghazi
, Klemens Böhm:
Secrecy and performance models for query processing on outsourced graph data. Distributed Parallel Databases 39(1): 35-77 (2021) - [j63]Edouard Fouché
, Alan Mazankiewicz, Florian Kalinke, Klemens Böhm:
A framework for dependency estimation in heterogeneous data streams. Distributed Parallel Databases 39(2): 415-444 (2021) - [j62]Holger Trittenbach, Adrian Englhardt, Klemens Böhm:
An overview and a benchmark of active learning for outlier detection with one-class classifiers. Expert Syst. Appl. 168: 114372 (2021) - [j61]Natalia Arzamasova, Klemens Böhm:
Scalable and data-aware SQL query recommendations. Inf. Syst. 96: 101646 (2021) - [j60]Edouard Fouché
, Florian Kalinke
, Klemens Böhm:
Efficient subspace search in data streams. Inf. Syst. 97: 101705 (2021) - [j59]Saeed Taghizadeh, Ábel Elekes, Martin Schäler, Klemens Böhm:
How meaningful are similarities in deep trajectory representations? Inf. Syst. 98: 101452 (2021) - [j58]Gabriela Suntaxi
, Aboubakr Achraf El Ghazi
, Klemens Böhm:
Preserving Secrecy in Mobile Social Networks. ACM Trans. Cyber Phys. Syst. 5(1): 5:1-5:29 (2021) - [j57]Georg Steinbuss, Klemens Böhm:
Generating Artificial Outliers in the Absence of Genuine Ones - A Survey. ACM Trans. Knowl. Discov. Data 15(2): 30:1-30:37 (2021) - [j56]Georg Steinbuss
, Klemens Böhm:
Benchmarking Unsupervised Outlier Detection with Realistic Synthetic Data. ACM Trans. Knowl. Discov. Data 15(4): 65:1-65:20 (2021) - [j55]Fabian Laforet
, Christian Olms, Rudolf Biczok, Klemens Böhm:
An Ensemble Technique for Better Decisions Based on Data Streams and its Application to Data Privacy. IEEE Trans. Knowl. Data Eng. 33(12): 3662-3674 (2021) - [c181]Jens Willkomm, Martin Schäler, Klemens Böhm:
Accurate Cardinality Estimation of Co-occurring Words Using Suffix Trees. DASFAA (2) 2021: 721-737 - [c180]Florian Kalinke
, Pawel Bielski, Snigdha Singh, Edouard Fouché, Klemens Böhm:
An Evaluation of NILM Approaches on Industrial Energy-Consumption Data. e-Energy 2021: 239-243 - [c179]Vadim Arzamasov, Klemens Böhm:
REDS: Rule Extraction for Discovering Scenarios. SIGMOD Conference 2021: 115-128 - [i11]Vadim Arzamasov, Benjamin Jochum, Klemens Böhm:
Pedagogical Rule Extraction for Learning Interpretable Models. CoRR abs/2112.13285 (2021) - 2020
- [j54]Alan Mazankiewicz, Klemens Böhm, Mario Berges:
Incremental Real-Time Personalization in Human Activity Recognition Using Domain Adaptive Batch Normalization. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(4): 144:1-144:20 (2020) - [j53]Ábel Elekes
, Adrian Englhardt, Martin Schäler, Klemens Böhm:
Toward meaningful notions of similarity in NLP embedding models. Int. J. Digit. Libr. 21(2): 109-128 (2020) - [j52]Adrian Englhardt
, Jens Willkomm, Martin Schäler, Klemens Böhm:
Improving semantic change analysis by combining word embeddings and word frequencies. Int. J. Digit. Libr. 21(3): 247-264 (2020) - [j51]Natalia Arzamasova
, Klemens Böhm, Bertrand Goldman
, Christian Saaler, Martin Schäler
:
On the Usefulness of SQL-Query-Similarity Measures to Find User Interests. IEEE Trans. Knowl. Data Eng. 32(10): 1982-1999 (2020) - [c178]Holger Trittenbach, Klemens Böhm, Ira Assent
:
Active Learning of SVDD Hyperparameter Values. DSAA 2020: 109-117 - [c177]Vadim Arzamasov, Rebecca Schwerdt, Shahab Karrari, Klemens Böhm, Tien Bach Nguyen:
Privacy Measures and Storage Technologies for Battery-Based Load Hiding - an Overview and Experimental Study. e-Energy 2020: 178-195 - [c176]Birgitta König-Ries, Klemens Böhm:
Data Science - more than just Machine Learning: A summary of the Data Science Session at INFORMATIK 2020. GI-Jahrestagung 2020: 59-60 - [c175]Edouard Fouché, Yu Meng, Fang Guo, Honglei Zhuang, Klemens Böhm, Jiawei Han:
Mining Text Outliers in Document Directories. ICDM 2020: 152-161 - [c174]Adrian Englhardt, Holger Trittenbach, Dennis Vetter, Klemens Böhm:
Finding the Sweet Spot: Batch Selection for One-Class Active Learning. SDM 2020: 118-126 - [c173]Adrian Englhardt, Klemens Böhm:
Exploring the Unknown - Query Synthesis in One-Class Active Learning. SDM 2020: 145-153 - [c172]Elaheh Ordoni, Jutta A. Mülle, Klemens Böhm:
Verification of Data-Value-Aware Processes and a Case Study on Spectrum Auctions. CBI (1) 2020: 181-190 - [i10]Georg Steinbuss, Klemens Böhm:
Benchmarking Unsupervised Outlier Detection with Realistic Synthetic Data. CoRR abs/2004.06947 (2020) - [i9]Alan Mazankiewicz, Klemens Böhm, Mario Bergés:
Incremental Real-Time Personalization in Human Activity Recognition Using Domain Adaptive Batch Normalization. CoRR abs/2005.12178 (2020) - [i8]Georg Steinbuss, Klemens Böhm:
Generating Artificial Outliers in the Absence of Genuine Ones - a Survey. CoRR abs/2006.03646 (2020) - [i7]Adrian Englhardt, Holger Trittenbach, Daniel Kottke, Bernhard Sick, Klemens Böhm:
Efficient SVDD Sampling with Approximation Guarantees for the Decision Boundary. CoRR abs/2009.13853 (2020) - [i6]Edouard Fouché, Florian Kalinke, Klemens Böhm:
Efficient Subspace Search in Data Streams. CoRR abs/2011.06959 (2020)
2010 – 2019
- 2019
- [j50]Holger Trittenbach
, Klemens Böhm
:
Dimension-based subspace search for outlier detection. Int. J. Data Sci. Anal. 7(2): 87-101 (2019) - [j49]Jutta A. Mülle
, Christine Tex
, Klemens Böhm:
A practical data-flow verification scheme for business processes. Inf. Syst. 81: 136-151 (2019) - [j48]Klemens Böhm, Dominik Werle:
Energy status data. it Inf. Technol. 61(2-3): 71-72 (2019) - [j47]Holger Trittenbach
, Jakob Bach
, Klemens Böhm:
Understanding the effects of temporal energy-data aggregation on clustering quality. it Inf. Technol. 61(2-3): 111-123 (2019) - [c171]Daniel Popovic
, Edouard Fouché
, Klemens Böhm
:
Unsupervised Artificial Neural Networks for Outlier Detection in High-Dimensional Data. ADBIS 2019: 3-19 - [c170]Holger Trittenbach, Klemens Böhm:
One-Class Active Learning for Outlier Detection with Multiple Subspaces. CIKM 2019: 811-820 - [c169]Michael Vollmer, Klemens Böhm:
Iterative Estimation of Mutual Information with Error Bounds. EDBT 2019: 73-84 - [c168]Georg Steinbuss, Benedikt Rzepka, Simon Bischof, Thomas Blank, Klemens Böhm:
FOBSS: Monitoring Data from a Modular Battery System. e-Energy 2019: 456-459 - [c167]Michael Vollmer, Adrian Englhardt, Holger Trittenbach, Pawel Bielski, Shahab Karrari
, Klemens Böhm:
Energy Time-Series Features for Emerging Applications on the Basis of Human-Readable Machine Descriptions. e-Energy 2019: 474-481 - [c166]Dominik Werle, Daniel Warzel, Simon Bischof, Anne Koziolek, Holger Trittenbach, Klemens Böhm:
The Effect of Temporal Aggregation on Battery Sizing for Peak Shaving. e-Energy 2019: 482-485 - [c165]Ábel Elekes, Antonino Simone Di Stefano, Martin Schäler, Klemens Böhm, Matthias Keller:
Learning from Few Samples: Lexical Substitution with Word Embeddings for Short Text Classification. JCDL 2019: 111-119 - [c164]Edouard Fouché, Junpei Komiyama, Klemens Böhm:
Scaling Multi-Armed Bandit Algorithms. KDD 2019: 1449-1459 - [c163]Gabriela Suntaxi
, Aboubakr Achraf El Ghazi
, Klemens Böhm:
Mutual Authorizations: Semantics and Integration Issues. SACMAT 2019: 213-218 - [c162]Jens Willkomm, Janek Bettinger, Martin Schäler, Klemens Böhm:
Efficient Interval-focused Similarity Search under Dynamic Time Warping. SSTD 2019: 130-139 - [c161]Vadim Arzamasov, Klemens Böhm, Ignaz Rutter
:
Minimizing Bias in Estimation of Mutual Information from Data Streams. SSDBM 2019: 1-12 - [c160]Edouard Fouché, Klemens Böhm:
Monte Carlo Dependency Estimation. SSDBM 2019: 13-24 - [c159]Michael Vollmer, Lukasz Golab, Klemens Böhm, Divesh Srivastava:
Informative Summarization of Numeric Data. SSDBM 2019: 97-108 - [i5]Vadim Arzamasov, Klemens Böhm:
Scenario Discovery via Rule Extraction. CoRR abs/1910.01713 (2019) - [i4]Holger Trittenbach, Klemens Böhm, Ira Assent:
Active Learning of SVDD Hyperparameter Values. CoRR abs/1912.01927 (2019) - 2018
- [j46]Natalia Arzamasova
, Martin Schäler
, Klemens Böhm:
Cleaning Antipatterns in an SQL Query Log. IEEE Trans. Knowl. Data Eng. 30(3): 421-434 (2018) - [c158]Mirela T. Cazzolato
, Agma J. M. Traina, Klemens Böhm:
Efficient and Reliable Estimation of Cell Positions. CIKM 2018: 1043-1052 - [c157]Ábel Elekes, Adrian Englhardt, Martin Schäler, Klemens Böhm:
Resources to Examine the Quality of Word Embedding Models Trained on n-Gram Data. CoNLL 2018: 423-432 - [c156]Holger Trittenbach, Martin Gauch, Klemens Böhm, Katrin Schulz:
Towards Simulation-Data Science - A Case Study on Material Failures. DSAA 2018: 450-459 - [c155]Michael Vollmer, Ignaz Rutter
, Klemens Böhm:
On Complexity and Efficiency of Mutual Information Estimation on Static and Dynamic Data. EDBT 2018: 49-60 - [c154]Holger Trittenbach, Jakob Bach
, Klemens Böhm:
On the Tradeoff between Energy Data Aggregation and Clustering Quality. e-Energy 2018: 399-401 - [c153]Christine Tex
, Philipp Hertweck
, Martin Schäler, Klemens Böhm:
PrivEnergy: a Privacy Operator Framework Addressing Individual Concerns. e-Energy 2018: 426-428 - [c152]Simon Bischof, Holger Trittenbach, Michael Vollmer, Dominik Werle, Thomas Blank, Klemens Böhm:
HIPE: An Energy-Status-Data Set from Industrial Production. e-Energy 2018: 599-603 - [c151]Christine Tex
, Martin Schäler, Klemens Böhm:
Distance-Based Data Mining over Encrypted Data. ICDE 2018: 1264-1267 - [c150]Natalia Arzamasova, Martin Schäler, Klemens Böhm:
Cleaning Antipatterns in an SQL Query Log. ICDE 2018: 1751-1752 - [c149]Jens Willkomm, Christoph Schmidt-Petri, Martin Schäler, Michael Schefczyk, Klemens Böhm:
A Query Algebra for Temporal Text Corpora. JCDL 2018: 183-192 - [c148]Vadim Arzamasov, Klemens Böhm, Patrick Jochem:
Towards Concise Models of Grid Stability. SmartGridComm 2018: 1-6 - [c147]Christine Tex
, Martin Schäler, Klemens Böhm:
Towards meaningful distance-preserving encryption. SSDBM 2018: 2:1-2:12 - [c146]Edouard Fouché, Alexander Eckert, Klemens Böhm:
In-database analytics with ibmdbpy. SSDBM 2018: 31:1-31:4 - [i3]Holger Trittenbach, Adrian Englhardt, Klemens Böhm:
An Overview and a Benchmark of Active Learning for One-Class Classification. CoRR abs/1808.04759 (2018) - [i2]Edouard Fouché, Klemens Böhm:
Monte Carlo Dependency Estimation. CoRR abs/1810.02112 (2018) - 2017
- [j45]Pavel Efros, Erik Buchmann, Adrian Englhardt, Klemens Böhm:
How to Quantify the Impact of Lossy Transformations on Event Detection. Big Data Res. 9: 84-97 (2017) - [j44]Georg Steinbuss
, Klemens Böhm:
Hiding outliers in high-dimensional data spaces. Int. J. Data Sci. Anal. 4(3): 173-189 (2017) - [j43]Gregor Hollmig, Matthias Horne, Simon Leimkühler, Frederik Schöll, Carsten Strunk, Adrian Englhardt, Pavel Efros, Erik Buchmann, Klemens Böhm:
An evaluation of combinations of lossy compression and change-detection approaches for time-series data. Inf. Syst. 65: 65-77 (2017) - [c145]Ábel Elekes, Martin Schäler, Klemens Böhm:
On the Various Semantics of Similarity in Word Embedding Models. JCDL 2017: 139-148 - 2016
- [j42]Christopher Oßner, Erik Buchmann, Klemens Böhm:
Identifying defective nodes in wireless sensor networks. Distributed Parallel Databases 34(4): 591-610 (2016) - [j41]Sanja Tanasijevic, Klemens Böhm:
Towards Effective Structure-Based Assessment of Proposals and Arguments in Online Deliberation. Int. J. Syst. Serv. Oriented Eng. 6(2): 29-52 (2016) - [j40]Richard Mrasek
, Jutta A. Mülle
, Klemens Böhm, Michael Becker, Christian Allmann:
Property specification, process verification, and reporting - A case study with vehicle-commissioning processes. Inf. Syst. 56: 326-346 (2016) - [c144]Karl Lorey, Erik Buchmann, Klemens Böhm:
TEAL: Transparent Encryption for the Database Abstraction Layer. CAiSE Forum 2016: 145-152 - [c143]Fabian Laforet, Erik Buchmann, Klemens Böhm:
Towards provable privacy guarantees using rechargeable energy-storage devices. e-Energy 2016: 7:1-7:14 - [c142]Andranik Khachatryan, Emmanuel Müller
, Klemens Böhm, Christian Stier:
Improving accuracy and robustness of self-tuning histograms by subspace clustering. ICDE 2016: 1544-1545 - [c141]Richard Mrasek, Jutta A. Mülle, Klemens Böhm:
Process Synthesis with Sequential and Parallel Constraints. OTM Conferences 2016: 43-60 - 2015
- [j39]Hoang Vu Nguyen, Emmanuel Müller
, Jilles Vreeken
, Klemens Böhm:
Erratum to: Unsupervised interaction-preserving discretization of multivariate data. Data Min. Knowl. Discov. 29(1): 296-297 (2015) - [j38]Richard Mrasek, Jutta A. Mülle
, Klemens Böhm:
A new verification technique for large processes based on identification of relevant tasks. Inf. Syst. 47: 82-97 (2015) - [j37]Stephan Kessler, Christoph M. Flath
, Klemens Böhm:
Allocative and strategic effects of privacy enhancement in smart grids. Inf. Syst. 53: 170-181 (2015) - [j36]Fabian Laforet, Erik Buchmann, Klemens Böhm:
Individual privacy constraints on time-series data. Inf. Syst. 54: 74-91 (2015) - [j35]Erik Buchmann, Patrick Erik Bradley, Klemens Böhm:
Deriving Bounds on the Size of Spatial Areas. Open J. Databases 2(1): 1-16 (2015) - [j34]Conny Kühne, Klemens Böhm:
Protecting the Dawid-Skene algorithm against low-competence raters and collusion attacks with gold-selection strategies. Soc. Netw. Anal. Min. 5(1): 67:1-67:25 (2015) - [j33]Andranik Khachatryan, Emmanuel Müller
, Christian Stier, Klemens Böhm:
Improving Accuracy and Robustness of Self-Tuning Histograms by Subspace Clustering. IEEE Trans. Knowl. Data Eng. 27(9): 2377-2389 (2015) - [j32]Frank Eichinger
, Pavel Efros, Stamatis Karnouskos
, Klemens Böhm:
A time-series compression technique and its application to the smart grid. VLDB J. 24(2): 193-218 (2015) - [j31]Clemens Heidinger, Klemens Böhm, Erik Buchmann, Martin Spoo:
Efficient and secure exact-match queries in outsourced databases. World Wide Web 18(3): 567-605 (2015) - [c140]Richard Mrasek, Jutta A. Mülle, Klemens Böhm:
Automatic Generation of Optimized Process Models from Declarative Specifications. CAiSE 2015: 382-397 - [c139]Yvonne Mülle, Chris Clifton, Klemens Böhm:
Privacy-Integrated Graph Clustering Through Differential Privacy. EDBT/ICDT Workshops 2015: 247-254 - [c138]Hoang Vu Nguyen, Klemens Böhm, Florian Becker, Bertrand Goldman, Georg Hinkel, Emmanuel Müller
:
Identifying User Interests within the Data Space - a Case Study with SkyServer. EDBT 2015: 641-652 - [c137]Patricia Iglesias Sánchez, Emmanuel Müller, Uwe Leo Korn, Klemens Böhm, Andrea Kappes, Tanja Hartmann, Dorothea Wagner:
Efficient Algorithms for a Robust Modularity-Driven Clustering of Attributed Graphs. SDM 2015: 100-108 - [c136]Fabian Keller, Emmanuel Müller, Klemens Böhm:
Estimating mutual information on data streams. SSDBM 2015: 3:1-3:12 - [c135]Pavel Efros, Erik Buchmann, Adrian Englhardt, Klemens Böhm:
How to quantify the impact of lossy transformations on change detection. SSDBM 2015: 17:1-17:11 - [c134]Stephan Kessler, Erik Buchmann, Klemens Böhm:
Deploying and Evaluating Pufferfish Privacy for Smart Meter Data. UIC/ATC/ScalCom 2015: 229-238 - 2014
- [j30]Hoang Vu Nguyen, Emmanuel Müller
, Klemens Böhm:
A Near-Linear Time Subspace Search Scheme for Unsupervised Selection of Correlated Features. Big Data Res. 1: 37-51 (2014) - [j29]Frank Eichinger
, Victor Pankratius, Klemens Böhm:
Data mining for defects in multicore applications: an entropy-based call-graph technique. Concurr. Comput. Pract. Exp. 26(1): 1-20 (2014) - [j28]Hoang Vu Nguyen, Emmanuel Müller
, Jilles Vreeken
, Klemens Böhm:
Unsupervised interaction-preserving discretization of multivariate data. Data Min. Knowl. Discov. 28(5-6): 1366-1397 (2014) - [j27]Jens Müller, Klemens Böhm:
Identity business processes. Int. J. Trust. Manag. Comput. Commun. 2(1): 40-77 (2014) - [j26]Jing Zhi Yue, Klemens Böhm, Silvia von Stackelberg:
Incentivizing High-Quality Reviews in Peer-to-Peer Settings: A Feasibility Study with Student Assignments. Int. J. Virtual Communities Soc. Netw. 6(1): 1-21 (2014) - [j25]Guido Sautter, Klemens Böhm:
Improved bibliographic reference parsing based on repeated patterns. Int. J. Digit. Libr. 14(1-2): 59-80 (2014) - [j24]Stephan Kessler, Erik Buchmann, Thorben Burghardt, Klemens Böhm:
Pattern-sensitive Time-series Anonymization and its Application to Energy-Consumption Data. Open J. Inf. Syst. 1(1): 3-22 (2014) - [j23]Silvia von Stackelberg, Susanne Putze, Jutta A. Mülle, Klemens Böhm:
Detecting Data-Flow Errors in BPMN 2.0. Open J. Inf. Syst. 1(2): 1-19 (2014) - [j22]Conny Kühne, Klemens Böhm:
Assessing the suitability of an honest rating mechanism for the collaborative creation of structured knowledge. World Wide Web 17(1): 85-104 (2014) - [c133]Sanja Tanasijevic, Klemens Böhm, Karl-Martin Ehrhart:
Behavioral Strategies in Online Forums with Different Feedback Types. BDCloud 2014: 555-563 - [c132]Richard Mrasek, Jutta A. Mülle, Klemens Böhm, Michael Becker, Christian Allmann:
User-Friendly Property Specification and Process Verification - A Case Study with Vehicle-Commissioning Processes. BPM 2014: 301-316 - [c131]Clemens Heidinger, Klemens Böhm, Erik Buchmann, Kai Richter:
FACTS: A Framework for Anonymity towards Comparability, Transparency, and Sharing - Exploratory Paper. CAiSE 2014: 120-135 - [c130]Hoang Vu Nguyen, Emmanuel Müller, Jilles Vreeken, Pavel Efros, Klemens Böhm:
Multivariate Maximal Correlation Analysis. ICML 2014: 775-783 - [c129]Patricia Iglesias Sánchez, Emmanuel Müller
, Oretta Irmler, Klemens Böhm:
Local context selection for outlier ranking in graphs with multiple numeric node attributes. SSDBM 2014: 16:1-16:12 - [c128]Hoang Vu Nguyen, Emmanuel Müller
, Periklis Andritsos, Klemens Böhm:
Detecting correlated columns in relational databases with mixed data types. SSDBM 2014: 30:1-30:12 - [c127]Pavel Efros, Erik Buchmann, Klemens Böhm:
FRESCO: A Framework to Estimate the Energy Consumption of Computers. CBI (1) 2014: 199-206 - 2013
- [j21]Christopher Oßner, Klemens Böhm:
Graphs for Mining-Based Defect Localization in Multithreaded Programs. Int. J. Parallel Program. 41(4): 570-593 (2013) - [j20]Erik Buchmann, Klemens Böhm, Thorben Burghardt, Stephan Kessler:
Re-identification of Smart Meter data. Pers. Ubiquitous Comput. 17(4): 653-662 (2013) - [j19]