Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extracting Logical Schema from the Web., , and . PRICAI Workshop on Text and Web Mining, page 64-71. (2000)Crafting Kinship Networks by Exploring Acquaintances Relationships., , , , and . IDC, volume 446 of Studies in Computational Intelligence, page 181-186. Springer, (2012)Credibility-based Model for News Spreading on Online Social Networks., , , , and . COMPLEXIS, page 34-42. SCITEPRESS, (2020)Users' attachment in trust networks: reputation vs. effort., , , and . Int. J. Bio Inspired Comput., 5 (4): 199-209 (2013)Authentication and Authorization Issues in Mobile Cloud Computing: A Case Study., , , , , and . CLOSER, page 249-256. SciTePress, (2019)Communities Unfolding in Multislice Networks., , , and . CompleNet, volume 116 of Communications in Computer and Information Science, page 187-195. Springer, (2010)Pervasive Home Security: An Intelligent Domotics Application., , , , and . IDC, 315, page 155-164. (2010)Dealing with the Best Attachment Problem via Heuristics., , , , and . IDC, volume 678 of Studies in Computational Intelligence, page 205-214. (2016)Social-Based Arcs Weight Assignment in Trust Networks., , , , and . IDC, volume 616 of Studies in Computational Intelligence, page 143-152. Springer, (2015)Black hole metric: Overcoming the pagerank normalization problem., , , , and . Inf. Sci., (2018)