Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The improvement of analytics in massive open online courses by applying data mining techniques., , , , and . Expert Syst. J. Knowl. Eng., 33 (4): 374-382 (2016)Application of Data Mining techniques to identify relevant Key Performance Indicators., , and . Comput. Stand. Interfaces, (2017)Enrichment of the phenotypic and genotypic Data Warehouse analysis using Question Answering systems to facilitate the decision making process in cereal breeding programs., , , , , and . Ecol. Informatics, 26 (2): 203-216 (2015)An Approach Aligned with Model Driven Development to Evaluate the Quality of Explainable Artificial Intelligence., , , and . ER (Workshops), volume 14319 of Lecture Notes in Computer Science, page 284-293. Springer, (2023)Conceptual Modeling for Indicator Selection., , and . Conceptual Modeling Perspectives, page 55-68. Springer, (2017)A systematic approach for dynamic targeted monitoring of KPIs., , , , , and . CASCON, page 192-206. IBM / ACM, (2014)CSRML4BI: A Goal-Oriented Requirements Approach for Collaborative Business Intelligence., , , , , , and . ER, volume 8824 of Lecture Notes in Computer Science, page 423-430. Springer, (2014)Visualization Requirements for Business Intelligence Analytics: A Goal-Based, Iterative Framework., , , and . RE, page 109-119. IEEE, (2019)On the joint use of i* with other modelling frameworks: A vision paper., , , and . RE, page 133-142. IEEE Computer Society, (2011)Security policies by design in NoSQL document databases., , , , , , , and . J. Inf. Secur. Appl., (2022)