Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Importance of "Who Tagged What", , , , , and . (2006)Searching for videos : the structure of video interaction in the framework of information foraging theory.. University of Twente, Enschede, Netherlands, (2009)base-search.net (ftunivtwente:oai:doc.utwente.nl:60628).A framework for video content browsing. Project report, TI/RS/2001/068. Enschede, Telematica Institute, (June 2002)Video Content Foraging., , and . CIVR, volume 3115 of Lecture Notes in Computer Science, page 15-23. Springer, (2004)The Multimedian Concert-Video Browser., , , , , , , , , and 1 other author(s). ICME, page 1561-1564. IEEE Computer Society, (2005)Shall I Trust a Recommendation? Towards an Evaluation of the Trustworthiness of Recommender Sites., , , and . ADBIS (Workshops), volume 5968 of Lecture Notes in Computer Science, page 121-128. Springer, (2009)Patch-based Video Browsing., , and . INTERACT, IOS Press, (2003)Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory model., , , , , and . Comput. Secur., (April 2023)