Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The reduction of the digital divide by improving the appropriateness of the web content., , , and . ITHET, page 1-5. IEEE, (2012)Simple and effective behavior tracking by post processing of association rules into segments., , , , , , and . iiWAS, page 296-300. ACM, (2011)Fast Frequent Pattern Detection Using Prime Numbers., , , and . IDEAL, volume 8669 of Lecture Notes in Computer Science, page 93-101. Springer, (2014)Recognizing the Threats of Drone Surveillance. A Case Study., , and . IVMSP, page 1-5. IEEE, (2022)Visual Methods and Tools for Social Network Analysis.. Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Combining information extraction and text mining for cancer biomarker detection., , , , and . ASONAM, page 948-955. ACM, (2013)SIREN - A Network Infrastructure for Emergencies., , , , and . ERCIM News, (2015)Periodicity data mining in time series using Suffix Arrays., , and . IEEE Conf. of Intelligent Systems, page 172-181. IEEE, (2012)Employing Social Network Construction and Analysis in Web Structure Optimization., , , , , , and . From Sociology to Computing in Social Networks, volume 1 of Lecture Notes in Social Networks, Springer, (2010)heteroHarvest: Harvesting information from heterogeneous sources., , , , and . ISI, page 231. IEEE, (2011)