Author of the publication

Social bookmarking tools as facilitators of learning and research collaborative processes: The Diigo case

, , and . Interdisciplinary Journal of E-Learning and Learning Objects, 6 (1): 175-191 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is more detailed feedback better for problem-solving?, , , and . Interact. Learn. Environ., 29 (7): 1189-1210 (2021)Model Sharing in the Simulation and Control of Distributed Discrete-Event Systems.. ICEIS (3), page 144-151. (2005)Dynamic Establishment of All-Optical Connections in Wavelength-Routed Optical Networks Using Genetic Algorithms., , , , , , , , and . ONDM, volume 242 of IFIP Conference Proceedings, page 377-392. Kluwer, (2002)Dynamic Routing and Wavelength Assignment in Optical Networks by Means of Genetic Algorithms., , , , , , , , , and 1 other author(s). Photonic Netw. Commun., 7 (1): 43-58 (2004)Social bookmarking tools as facilitators of learning and research collaborative processes: The Diigo case, , and . Interdisciplinary Journal of E-Learning and Learning Objects, 6 (1): 175-191 (2010)Kefuri: A novel technological tool for increasing organ donation in Chile., , , and . WI/IAT, page 470-475. IEEE, (2020)Feature Selection for Microarray Gene Expression Data using Simulated Annealing guided by the Multivariate Joint Entropy, and . CoRR, (2013)Leaving timing-channel fingerprints in hidden service log files., , and . Digit. Investig., 7 (Supplement): S104-S113 (2010)Quantization-based watermarking performance improvement using host statistics: AWGN attack case., , , , and . MM&Sec, page 35-39. ACM, (2004)On achievable security levels for lattice data hiding in the known message attack scenario., , and . MM&Sec, page 68-79. ACM, (2006)