Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tailoring Object Descriptions to a User's Level of Expertise.. Computational Linguistics, 14 (3): 64-78 (1988)Applying Attribution Theory to is Research as a Practical Method for Assessing Post-Adoption Behaviour., , and . ECIS, (2014)Cross-Fertilization Between Human Computer Interaction and Natural Language Processing: Why and How., and . I. J. Speech Technology, 5 (2): 135-146 (2002)Introduction to the KBS Special Issue on Intelligent User Interfaces., and . Knowl. Based Syst., 20 (6): 509-510 (2007)DCAT: A Deep Context-Aware Trust Prediction Approach for Online Social Networks., , , , , and . MoMM, page 20-27. ACM, (2019)Behavior-Based Propagation of Trust in Social Networks with Restricted and Anonymous Participation., , and . Comput. Intell., 31 (4): 642-668 (2015)The role of the user's domain knowledge in generation.. Comput. Intell., (1991)Automatic Acquisition of Task Models from Object Oriented Design Specifications: A Case Study., and . ECOOP Workshops, volume 1743 of Lecture Notes in Computer Science, page 281-282. Springer, (1999)What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text., , , , and . IEEE Trans. Serv. Comput., 13 (3): 584-596 (2020)Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps., , , , , , , and . ACM Trans. Cyber Phys. Syst., 3 (4): 36:1-36:21 (2019)