Author of the publication

Are you a trustworthy partner in a cross-cultural virtual environment?: behavioral cultural intelligence and receptivity-based trust in virtual collaboration.

, , , and . ICIC, page 87-96. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CHASSIS: Conformity Meets Online Information Diffusion., , and . SIGMOD Conference, page 1829-1840. ACM, (2020)BRUNCH: Branching Structure Inference of Hybrid Multivariate Hawkes Processes with Application to Social Media., , and . PAKDD (1), volume 12084 of Lecture Notes in Computer Science, page 553-566. Springer, (2020)Predicting Aging-Genes in Drosophila Melanogaster by Integrating Network Topological Features and Functional Categories., , , , and . IJKDB, 3 (2): 16-26 (2012)Discovering Aging-Genes by Topological Features in Drosophila melanogaster Protein-Protein Interaction Network., , , , and . ICDM Workshops, page 94-98. IEEE Computer Society, (2012)Semi-supervised imputation for microarray missing value estimation., , and . BIBM, page 297-300. IEEE Computer Society, (2014)Improvement of MRA-Based Pansharpening Methods Through the Considerasion of Mixed Pixels., and . IGARSS, page 5112-5115. IEEE, (2018)On the Duality and File Size Hierarchy of Fractional Repetition Codes., , and . Comput. J., 62 (1): 150-160 (2019)G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks., , and . IEEE Trans. Vehicular Technology, 66 (11): 9689-9701 (2017)Technique of Target Tracking for Ballistic Missile., , , and . ITITS (1), volume 454 of Advances in Intelligent Systems and Computing, page 319-329. (2015)DACC: A Data Exploration Method for High-Dimensional Data Sets., , , , and . CSOS (2), volume 764 of Advances in Intelligent Systems and Computing, page 219-229. Springer, (2018)