From post

Automated Analysis of e-Participation Data by Utilizing Associative Networks, Spreading Activation and Unsupervised Learning.

, , и . ePart, том 5694 из Lecture Notes in Computer Science, стр. 139-150. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

User Tracking Based on Behavioral Fingerprints., , и . CANS, том 6467 из Lecture Notes in Computer Science, стр. 76-95. Springer, (2010)RDF Data Analysis with Activation Patterns, и . 10th International Conference on Knowledge Management and Knowledge Technologies 1–3 September 2010, Messe Congress Graz, Austria, стр. 18 - 18. (2010)iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments., , , и . SECRYPT, стр. 170-182. SciTePress, (2013)In Certificates We Trust - Revisited., , и . TrustCom/BigDataSE/ISPA (1), стр. 702-709. IEEE, (2015)CrySIL: Bringing Crypto to the Modern User., , и . WEBIST (Revised Selected Papers), том 246 из Lecture Notes in Business Information Processing, стр. 70-90. Springer, (2015)WebCrySIL - Web Cryptographic Service Interoperability Layer., , и . WEBIST, стр. 35-44. SciTePress, (2015)Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe., и . EGOVIS, том 9265 из Lecture Notes in Computer Science, стр. 86-100. Springer, (2015)Massive Data Mining for Polymorphic Code Detection., , , и . MMM-ACNS, том 3685 из Lecture Notes in Computer Science, стр. 448-453. Springer, (2005)Android encryption systems., , , , , и . PRISMS, стр. 1-8. IEEE, (2014)Secure and Privacy-Preserving Proxy Voting System., , и . ICEBE, стр. 472-477. IEEE Computer Society, (2013)