Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Detection for the Security of Cargo Shipments., , and . IF&GIS, page 289-303. Springer, (2013)FrameSTEP: A framework for annotating semantic trajectories based on episodes., , , and . Expert Syst. Appl., (2018)Generic framework for enriching services: a multiagent approach., , , , , , , and . Int. J. Web Inf. Syst., 11 (2): 246-268 (2015)QACBAC: an owner-centric QoC-aware context-based access control model for pervasive environments., and . SPRINGL, page 30-38. ACM, (2008)Privacy-Aware personal Information Discovery model based on the cloud., , and . LANOMS, page 35-40. IEEE, (2015)Clustering User Trajectories to Find Patterns for Social Interaction Applications., , , and . W2GIS, volume 7236 of Lecture Notes in Computer Science, page 82-97. Springer, (2012)Intégration de données vidéo dans un SGBD à objets., and . L'OBJET, (2000)Clariisa, a context-aware framework based on geolocation for a health care governance system., , , , , , , and . Healthcom, page 334-339. IEEE, (2013)ASHYI-EDU: Applying Dynamic Adaptive Planning in a Virtual Learning Environment., , , , , , , , , and . CSEDU (1), page 52-63. SciTePress, (2015)Query Routing in Nomadic Environments with PUMAS., , , , and . WEBIST (2), page 125-130. INSTICC Press, (2008)