Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for usable end-user privacy control in social software systems., and . EAI Endorsed Trans. Security Safety, 1 (1): e4 (2011)Authoring Services-Centered Web-based Learning Environment: a Hybrid Model for Multimedia Components and Web Services Composition, , and . ED-MEDIA Conference, (June 2005)Trust-aware privacy control for social media., , and . CHI Extended Abstracts, page 1597-1602. ACM, (2011)Gamifying Knowledge Sharing in the Humanitarian Context., , , , , and . ACM DEV, page 21:1-21:4. ACM, (2016)The 3A Interaction Model: Towards Bridging the Gap between Formal and Informal Learning., , and . ACHI, page 179-184. IEEE Computer Society, (2010)Collecting Experience Data from Remotely Hosted Learning Applications., , , , and . REV, 22, page 170-181. Springer, (2017)3D collision avoidance algorithm for Unmanned Aerial Vehicles with limited field of view constraints., , and . CDC, page 2555-2560. IEEE, (2016)A new approach in the use of multimedia for technology enhanced learning., and . ACC, page 3449-3453. IEEE, (2000)Foreword., , , and . EC-TEL PROLEARN, volume 288 of CEUR Workshop Proceedings, CEUR-WS.org, (2007)Examining the Effects of Social Media in Co-located Classrooms: A Case Study Based on SpeakUp., , , and . EC-TEL, volume 9891 of Lecture Notes in Computer Science, page 247-262. Springer, (2016)