Author of the publication

A personalized collaborative digital library environment: a model and an application

, and . Inf. Process. Manage., 41 (1): 5--21 (January 2005)
DOI: 10.1016/j.ipm.2004.04.007

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating multi-hop beaconing forwarding strategies for IEEE 802.11p vehicular networks., , and . VNC, page 31-38. IEEE, (2013)Measurement-based modeling of packet inter-reception time in presence of radio channel congestion., , and . SECON, page 432-440. IEEE, (2014)Detecting fuzzy amino acid tandem repeats in protein sequences., , and . BCB, page 87-95. ACM, (2011)TRStalker: an efficient heuristic for finding fuzzy tandem repeats., , and . Bioinform., 26 (12): 358-366 (2010)AMIC@: All MIcroarray Clusterings @ once., , and . Nucleic Acids Res., 36 (Web-Server-Issue): 315-319 (2008)FPF-SB : A Scalable Algorithm for Microarray Gene Expression Data Clustering., , , , and . HCI (12), volume 4561 of Lecture Notes in Computer Science, page 606-615. Springer, (2007)IT in Biology & Medical Informatics: On the Challenge of Understanding the Data Ecosystem., , , and . ITBAM, volume 10443 of Lecture Notes in Computer Science, page 3-7. Springer, (2017)Web metasearch: rank vs. score based rank aggregation methods, and . SAC '03: Proceedings of the 2003 ACM symposium on Applied computing, page 841--846. New York, NY, USA, ACM Press, (2003)Multihop Beaconing Forwarding Strategies in Congested IEEE 802.11p Vehicular Networks., , and . IEEE Trans. Veh. Technol., 65 (9): 7515-7528 (2016)Quantifying the Tradeoff Between Cybersecurity and Location Privacy., , and . CoRR, (2021)