Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Direct trust assignment using social reputation and aging., , , , and . J. Ambient Intell. Humaniz. Comput., 8 (2): 167-175 (2017)A model for a web-based learning system., , , and . Inf. Syst. Frontiers, 9 (2-3): 267-282 (2007)Information categorization in web pages and sites., , and . Web Intell. Agent Syst., 3 (3): 183-198 (2005)Using Lotos in Workflow Specification., , and . ICEIS (3), page 364-369. (2003)Reliable peers and useful resources: Searching for the best personalised learning path in a trust- and recommendation-aware environment., , and . Inf. Sci., 180 (10): 1893-1907 (2010)Hidden Schema Extraction in Web Documents., , and . DNIS, volume 2822 of Lecture Notes in Computer Science, page 42-52. Springer, (2003)Using Twitter Data and Sentiment Analysis to Study Diseases Dynamics., , and . ITBAM, volume 9267 of Lecture Notes in Computer Science, page 16-24. Springer, (2015)The Effect of Topology on the Attachment Process in Trust Networks., , , and . IDC, volume 570 of Studies in Computational Intelligence, page 377-382. Springer, (2014)Trust assessment: a personalized, distributed, and secure approach., , , and . Concurr. Comput. Pract. Exp., 24 (6): 605-617 (2012)Efficient Node PageRank Improvement via Link-building using Geometric Deep Learning., , , , and . ACM Trans. Knowl. Discov. Data, 17 (3): 38:1-38:22 (April 2023)