Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When machines trade on corporate disclosures: Using text analytics for investment strategies., , , and . Decis. Support Syst., (2023)Information Space Dashboard., , and . STOC@LREC, page 29-34. European Language Resources Association, (2020)Towards Robust Speech Interfaces for the ISS., , , , , and . IUI Companion, page 110-111. ACM, (2020)Tactical information aggregation., , and . ICMCIS, page 1-7. IEEE, (2021)Reconnaissance Target Detection., and . ICMCIS, page 1-9. IEEE, (2024)Developing a Network of Cultural Heritage Objects Repositories for Educational Purposes., , and . MTSR, volume 240 of Communications in Computer and Information Science, page 337-348. Springer, (2011)Exploitation of usage and attention metadata., and . GI Jahrestagung, volume P-154 of LNI, page 176-177. GI, (2009)Cloud Services within a ROLE-enabled Personal Learning Environment., , , and . WCLOUD, volume 945 of CEUR Workshop Proceedings, page 61-65. CEUR-WS.org, (2012)A Mashup Recommender for Creating Personal Learning Environments., , , , , and . ICWL, volume 7558 of Lecture Notes in Computer Science, page 79-88. Springer, (2012)Self-monitoring for Computer Users., , , , , , and . GI Jahrestagung, volume P-154 of LNI, page 1680-1687. GI, (2009)