Author of the publication

Preserving Recomputability of Results from Big Data Transformation Workflows: Depending on External Systems and Human Interactions

, , and . Datenbank-Spektrum, (September 2017)
DOI: 10.1007/s13222-017-0265-6

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Martin Potthast

Zero-shot Generative Large Language Models for Systematic Review Screening Automation, , , , , and . Advances in Information Retrieval. 46th European Conference on IR Research (ECIR 2024), volume 14608 of Lecture Notes in Computer Science, page 403--420. Berlin Heidelberg New York, Springer, (March 2024)
Zero-shot Generative Large Language Models for Systematic Review Screening Automation, , , , , and . Advances in Information Retrieval. 46th European Conference on IR Research (ECIR 2024), volume 14608 of Lecture Notes in Computer Science, page 403--420. Berlin Heidelberg New York, Springer, (March 2024)Identifying queries in instant search logs, , , , and . Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, New York, NY, USA, ACM, (July 2021)28. September - 2. Oktober 2020, , , , , , and . Gesellschaft für Informatik, Bonn, (2021)
 

Other publications of authors with the same name

A Modern and Sophisticated Host Based Intrusion Detection Data Set, , , and . (2019)Intrusion detection on system call graphs, , , , and . Sicherheit in vernetzten Systemen, pages G1--G18, (2018)Preserving Recomputability of Results from Big Data Transformation Workflows: Depending on External Systems and Human Interactions, , and . Datenbank-Spektrum, (September 2017)The First Data Science Challenge at BTW 2017, , , , , , , , , and 4 other author(s). Datenbank-Spektrum, (July 2017)Preserving recomputability of results from big data transformation workflows, , and . Datenbank Spektrum, 17 (3): 245--253 (November 2017)Dataset Report: LID-DS 2021, , , , , , and . International Conference on Critical Information Infrastructures Security, page 63--73. Springer, (2022)Standardized container virtualization approach for collecting host intrusion detection data, , , , and . Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, IEEE, (September 2019)Data-Science-Challenge: Graph-based analysis and demand prediction for bike rentals, , , , and . (2017)