Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracking Criminal Events through IoT Devices and an Edge Computing Approach., , and . ICCCN, page 1-6. IEEE, (2019)On the Automated Assessment of Open-Source Cyber Threat Intelligence Sources., , and . ICCS (2), volume 12138 of Lecture Notes in Computer Science, page 453-467. Springer, (2020)Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media., , , and . NCA, page 1-10. IEEE, (2018)Tour Guides Get Guided: Intelligent Coordination of Simultaneous Tours in Exhibition Environments., , , , and . MobiQuitous, page 274-283. ACM, (2018)VRChairRacer: Using an Office Chair Backrest as a Locomotion Technique for VR Racing Games., , , , , and . CHI Extended Abstracts, ACM, (2019)Mind the Tap: Assessing Foot-Taps for Interacting with Head-Mounted Displays., , , , , and . CHI, page 477. ACM, (2019)Mixed-code text analysis for the detection of online hidden propaganda., , and . ARES, page 76:1-76:7. ACM, (2020)Relative Stability of the Planar and Butterfly-like Structures of Cyclic P2O2, , , , and . The Journal of Physical Chemistry, 100 (1): 120--122 (January 1996)Einfluß der Ladungsverteilung auf die Bindungslängen im P4O6-Gerüst von Verbindungen des Typs P4O6X, , , , , and . Angewandte Chemie, 106 (5): 578--581 (March 1994)Efficient privacy-preserving recommendations based on social graphs., , , and . RecSys, page 78-86. ACM, (2019)