Author of the publication

Automated Analysis of e-Participation Data by Utilizing Associative Networks, Spreading Activation and Unsupervised Learning.

, , and . ePart, volume 5694 of Lecture Notes in Computer Science, page 139-150. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Tracking Based on Behavioral Fingerprints., , and . CANS, volume 6467 of Lecture Notes in Computer Science, page 76-95. Springer, (2010)RDF Data Analysis with Activation Patterns, and . 10th International Conference on Knowledge Management and Knowledge Technologies 1–3 September 2010, Messe Congress Graz, Austria, page 18 - 18. (2010)iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments., , , and . SECRYPT, page 170-182. SciTePress, (2013)In Certificates We Trust - Revisited., , and . TrustCom/BigDataSE/ISPA (1), page 702-709. IEEE, (2015)Massive Data Mining for Polymorphic Code Detection., , , and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 448-453. Springer, (2005)Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe., and . EGOVIS, volume 9265 of Lecture Notes in Computer Science, page 86-100. Springer, (2015)Android encryption systems., , , , , and . PRISMS, page 1-8. IEEE, (2014)WebCrySIL - Web Cryptographic Service Interoperability Layer., , and . WEBIST, page 35-44. SciTePress, (2015)CrySIL: Bringing Crypto to the Modern User., , and . WEBIST (Revised Selected Papers), volume 246 of Lecture Notes in Business Information Processing, page 70-90. Springer, (2015)Secure and Privacy-Preserving Proxy Voting System., , and . ICEBE, page 472-477. IEEE Computer Society, (2013)