Author of the publication

Vertrauliche Verarbeitung staatlich eingestufter Information - die Informationstechnologie im Geheimschutz.

, , , , and . Inform. Spektrum, 32 (2): 102-109 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining ideas from textual information., , and . Expert Syst. Appl., 37 (10): 7182-7188 (2010)Technology classification with latent semantic indexing., and . Expert Syst. Appl., 40 (5): 1786-1795 (2013)Quantitative cross impact analysis with latent semantic indexing., and . Expert Syst. Appl., 41 (2): 406-411 (2014)Using Text Summarizing to Support Planning of Research and Development., and . WorldCIST (1), volume 275 of Advances in Intelligent Systems and Computing, page 23-29. Springer, (2014)Hadith data mining and classification: a comparative analysis., , , , , and . Artif. Intell. Rev., 46 (1): 113-128 (2016)Finding New Technological Ideas and Inventions with Text Mining and Technique Philosophy.. GfKl, page 413-420. Springer, (2007)Predicting customer profitability during acquisition: Finding the optimal combination of data source and data mining technique., , and . Expert Syst. Appl., 40 (6): 2007-2012 (2013)Weak signal identification with semantic web mining., and . Expert Syst. Appl., 40 (12): 4978-4985 (2013)Predicting e-commerce company success by mining the text of its publicly-accessible website., and . Expert Syst. Appl., 39 (17): 13026-13034 (2012)Using Webcrawling of Publicly Available Websites to Assess E-commerce Relationships., and . SRII Global Conference, page 402-410. IEEE Computer Society, (2012)