From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Lotos in Workflow Specification., , и . ICEIS (3), стр. 364-369. (2003)A model for a web-based learning system., , , и . Inf. Syst. Frontiers, 9 (2-3): 267-282 (2007)Trust assessment: a personalized, distributed, and secure approach., , , и . Concurr. Comput. Pract. Exp., 24 (6): 605-617 (2012)Information categorization in web pages and sites., , и . Web Intell. Agent Syst., 3 (3): 183-198 (2005)Hidden Schema Extraction in Web Documents., , и . DNIS, том 2822 из Lecture Notes in Computer Science, стр. 42-52. Springer, (2003)Virtualization for Effective Risk-Free Network Security Assessment., , , и . Int. J. Online Eng., 10 (5): 21-28 (2014)Efficient Node PageRank Improvement via Link-building using Geometric Deep Learning., , , , и . ACM Trans. Knowl. Discov. Data, 17 (3): 38:1-38:22 (апреля 2023)The Effect of Topology on the Attachment Process in Trust Networks., , , и . IDC, том 570 из Studies in Computational Intelligence, стр. 377-382. Springer, (2014)Using Twitter Data and Sentiment Analysis to Study Diseases Dynamics., , и . ITBAM, том 9267 из Lecture Notes in Computer Science, стр. 16-24. Springer, (2015)Reliable peers and useful resources: Searching for the best personalised learning path in a trust- and recommendation-aware environment., , и . Inf. Sci., 180 (10): 1893-1907 (2010)