Author of the publication

International research program in cross-boundary information sharing.

, , , and . DG.O, volume 289 of ACM International Conference Proceeding Series, page 409-410. Digital Government Research Center, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Algorithm for Testing the Membership of Gaussian Multiple-Access Channel Capacity Region., , , and . IEEE Communications Letters, 20 (11): 2137-2140 (2016)Cross-national information policy conflict regarding access to information: building a conceptual framework.. DG.O, volume 228 of ACM International Conference Proceeding Series, page 201-211. Digital Government Research Center, (2007)Examining e-government enterprise architecture research in China: A systematic approach and research agenda., and . Gov. Inf. Q., 30 (Supplement-1): S59-S67 (2013)Innovation through social media in the public sector: Information and interactions., and . Gov. Inf. Q., 31 (Supplement-1): S106-S117 (2014)Mapping government social media research and moving it forward: A framework and a research agenda., and . Gov. Inf. Q., 34 (3): 496-510 (2017)Modeling and Analyzing Duty-Cycling Pipelined-Scheduling MAC for Linear Sensor Networks., , , , and . IEEE Trans. Veh. Technol., 65 (4): 2608-2620 (2016)Delay in Arctic Sea Ice Freeze-Up Linked to Early Summer Sea Ice Loss: Evidence from Satellite Observations., , , and . Remote. Sens., 13 (11): 2162 (2021)Analysing educational scientific collaboration through multilayer networks: patterns, impact and network generation model., , , , , and . J. Complex Networks, (September 2023)Learning-based Predictive Path Following Control for Nonlinear Systems Under Uncertain Disturbances., , , and . CoRR, (2022)FFT-based multidimensional linear attack on PRESENT using the 2-bit-fixed characteristic., and . Secur. Commun. Networks, 8 (18): 3535-3545 (2015)