Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Organization Man and the Innovator: Theoretical Archetypes to Inform Behavioral Information Security Research., and . DATA BASE, 49 (SI): 67-80 (2018)An Experiential Approach to Interacting with Biological Information., , and . ISVC (2), volume 4292 of Lecture Notes in Computer Science, page 678-687. Springer, (2006)3-540-48628-3.Semantically Relevant Image Retrieval by Combining Image and Linguistic Analysis., and . ISVC (2), volume 4292 of Lecture Notes in Computer Science, page 770-779. Springer, (2006)3-540-48628-3.Facilitating message exchange though middle agents., , , and . AAMAS, page 561-562. ACM, (2002)An empirical evaluation of information security awareness levels in designing secure business processes., , and . DESRIST, ACM, (2009)Researchexplorer: gaining insights through exploration in multimedia scientific data., , and . Multimedia Information Retrieval, page 7-14. ACM, (2004)Discovering User Information Goals with Semantic Website Media Modeling., , and . MMM (1), volume 4351 of Lecture Notes in Computer Science, page 364-375. Springer, (2007)Segmenting the Etiological Agent of Schistosomiasis for High-Content Screening., and . IEEE Trans. Medical Imaging, 32 (6): 1007-1018 (2013)Distributed query plan generation using multi-objective ant colony optimisation., , and . Int. J. Artif. Intell. Soft Comput., 5 (3): 241-262 (2016)Distributed Query Plan Generation using Particle Swarm Optimization., , and . Int. J. Swarm Intell. Res., 4 (3): 58-82 (2013)