Author of the publication

East Timorese History after Independence

. History Workshop Journal, 61 (1): 222-237 (2006)(ISSP).

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

National identity in fragile states: insights from tertiary students in Melanesia and Timor-Leste, , , , and . Commonwealth & Comparative Politics, 51 (4): 447-478 (2013)https://doi.org/10.1080/14662043.2013.841004. (ISSP).East Timorese History after Independence. History Workshop Journal, 61 (1): 222-237 (2006)(ISSP).The future of institutional repositories: The experts (and audience) debate., , , , , and . ASIST, volume 44 of Proc. Assoc. Inf. Sci. Technol., page 1-4. Wiley, (2007)Marketing Information Services in the Digital Age: Viewpoints from Academic Libraries in North America and the Asia-Pacific Rim., and . ICADL, volume 3334 of Lecture Notes in Computer Science, page 676. Springer, (2004)Java in a Nutshell: A Desktop Quick Reference, by David Flanagan.. JASIS, 49 (14): 1329-1330 (1998)Digital library repository service planning and development., , and . ASIST, volume 41 of Proc. Assoc. Inf. Sci. Technol., page 570. Wiley, (2004)An Adaptive Motion Model for Person Tracking with Instantaneous Head-Pose Features., , , and . IEEE Signal Process. Lett., 22 (5): 578-582 (2015)Contextual anomaly detection in crowded surveillance scenes., , and . Pattern Recognit. Lett., (2014)Automatic human behaviour anomaly detection in surveillance video.. Heriot-Watt University, Edinburgh, UK, (2015)British Library, EThOS.Detecting Social Groups in Crowded Surveillance Videos Using Visual Attention., , , and . CVPR Workshops, page 467-473. IEEE Computer Society, (2014)