Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Knowledge-based platform for eGovernment agents: A Web-based solution using semantic technologies., , , , and . Expert Syst. Appl., 37 (5): 3647-3656 (2010)User-centric mobile services: context provisioning and user profiling.. DG.O, page 122-130. Digital Government Research Center, (2010)Policy makers and performance management in e-government domain., , and . ICEGOV, volume 444 of ACM International Conference Proceeding Series, page 202-210. ACM, (2010)A participant testing strategy for service orchestrations., , , and . ICDIM, page 308-313. IEEE, (2008)HawkEye: a tool for collaborative business process modelling and verification., , , , and . SAC, page 785-786. ACM, (2013)User-centric mobile services: context provisioning and user profiling.. DG.O, page 122-130. Digital Government Research Center, (2010)Five factors that make pervasive business intelligence a winning wager., , , and . IEEM, page 617-621. IEEE, (2014)Understanding Production Chain Business Process Using Process Mining: A Case Study in the Manufacturing Scenario., , and . CAiSE Workshops, volume 249 of Lecture Notes in Business Information Processing, page 193-203. Springer, (2016)RFID Privacy and Security Risks: Italian Case Study., , and . IAIT, volume 409 of Communications in Computer and Information Science, page 173-183. Springer, (2013)A secure framework in mobile business transactions., , , and . Mobility Conference, page 35. ACM, (2006)