Author of the publication

Adaptation dans la présentation de documents semi-structurés selon les préférences utilisateur.

, , , , and . INFORSID, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reconstruction dynamique de documents., and . EGC, volume 1 of Extraction des Connaissances et Apprentissage, page 363-374. Hermes Science Publications, (2002)Fuzzy Intersection and Difference Model for Topological Relations., , and . IFSA/EUSFLAT Conf., page 1079-1084. (2009)Optimimal resources utilization for indexing within a distributed multimedia retrieval system: an implementation for a video surveillance use case., , and . DMS, page 107-112. Knowledge Systems Institute, (2012)Interoperability in Pervasive Enterprise Information Systems - A Double-Faced Coin Between Security And Accessability., and . ICEIS (3), page 237-242. (2007)An Ontology-Based Modeling Approach for Developing a Competencies-Oriented Collective Intelligence., , , , and . Learning to Live in the Knowledge Society, volume 281 of IFIP, page 219-222. Springer, (2008)Information Quality in Social Networks: A Collaborative Method for Detecting Spam Tweets in Trending Topics., , , and . IEA/AIE (2), volume 10351 of Lecture Notes in Computer Science, page 211-223. Springer, (2017)Social collaborative service recommendation approach based on user's trust and domain-specific expertise., , , , and . Future Gener. Comput. Syst., (2018)Analyse du comportement d'annotation du réseau social d'un utilisateur pour la détection des intérêts., , , , and . Ingénierie des Systèmes d Inf., 20 (4): 85-111 (2015)Leveraging time for spammers detection on Twitter., , and . MEDES, page 109-116. ACM, (2016)Proposition d'un modèle d'évaluation de la confiance pour la détection des attaques dans l'Internet des Objets Social., , , and . EGC, volume E-36 of RNTI, page 471-472. Éditions RNTI, (2020)