Author of the publication

Conceptual Model - Meeting of Cultures.

, , , , , and . UNISCON, volume 5 of Lecture Notes in Business Information Processing, page 365-370. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Responsible Artificial Intelligence: A Structured Literature Review., , and . CoRR, (2024)Permissions vs. Privacy Policies of Apps in Google Play Store and Apple App Store., , and . EJC, volume 364 of Frontiers in Artificial Intelligence and Applications, page 258-275. IOS Press, (2022)Comparisons between Three Cross-Validation Methods for Measuring Learners' Performances., , and . EJC, volume 272 of Frontiers in Artificial Intelligence and Applications, page 77-87. IOS Press, (2014)WSDL and UDDI extensions for version support in web services., , , and . J. Syst. Softw., 82 (8): 1326-1343 (2009)User Experience of Croatian National & Nature Parks' Website - A Comparison., , and . HCI (43), volume 1832 of Communications in Computer and Information Science, page 561-570. Springer, (2023)Predicting Sample Size in Data Mining Tasks: Using Additive Incremental Approach., , and . EJC, volume 67 of Frontiers in Artificial Intelligence and Applications, page 264-270. IOS Press, (2000)Opening the Knowledge Tombs - Web Based Text Mining as Approach for Re-evaluation of Machine Learning Rules., , and . ADBIS, volume 6295 of Lecture Notes in Computer Science, page 533-542. Springer, (2010)Observing a Naïve Bayes Classifier's Performance on Multiple Datasets., , and . ADBIS, volume 8716 of Lecture Notes in Computer Science, page 263-275. Springer, (2014)Performance analysis of two open source intrusion detection systems., and . MIPRO, page 1387-1392. IEEE, (2016)Learning Process Termination Criteria., , , , , , and . Informatica, 23 (4): 521-536 (2012)