Author of the publication

How Participation in an Intensive Project Can Increase 3rd Level Students' Awareness of Entrepreneurship.

, , , , , , , and . ICTERI, volume 2105 of CEUR Workshop Proceedings, page 394-404. CEUR-WS.org, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Data Exchange Based on Social Networks Public Key Distribution., , and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 52-63. (2015)Applications of QR Codes in Secure Mobile Data Exchange., , and . CN, volume 431 of Communications in Computer and Information Science, page 277-286. Springer, (2014)Soft Skills Development in Computer Science Students via Multinational and Multidisciplinary GameDev Project., , , , , and . SIGCSE, page 583-589. ACM, (2021)From the Game Ideas Prototypes to their Final Versions using International Intensive Project Results., , , and . SIGCSE (2), page 1143. ACM, (2022)How Participation in an Intensive Project Can Increase 3rd Level Students' Awareness of Entrepreneurship., , , , , , , and . ICTERI, volume 2105 of CEUR Workshop Proceedings, page 394-404. CEUR-WS.org, (2018)Enhancements of Encryption Method Used in SDEx., , and . CN, volume 718 of Communications in Computer and Information Science, page 134-143. Springer, (2017)Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash Function.. LCN, page 238-241. IEEE, (2019)Machine Learning Application in Energy Consumption Calculation and Assessment in Food Processing Industry., , , , , and . ICAISC (2), volume 12416 of Lecture Notes in Computer Science, page 369-379. Springer, (2020)Machine Learning Methods in Energy Consumption Optimization Assessment in Food Processing Industry., , , , , and . IDAACS, page 835-840. IEEE, (2021)Applications of Secure Data Exchange Method Using Social Media to Distribute Public Keys., , and . CN, volume 522 of Communications in Computer and Information Science, page 389-399. Springer, (2015)