Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating corroborated crisis reports from social media data through formal concept analysis., , , and . J. Intell. Inf. Syst., 47 (2): 287-312 (2016)Radio-Frequency Identification (RFID) applications: A brief introduction., , and . Adv. Eng. Informatics, 21 (4): 350-355 (2007)Combining Big Social Media Data and FCA for Crisis Response., , , , and . UCC, page 690-695. IEEE Computer Society, (2014)A social media and crowdsourcing data mining system for crime prevention during and post-crisis situations., , , , and . J. Systems and IT, 18 (4): 364-382 (2016)Service-Oriented Design of a Command and Control Intelligence Dashboard for Crisis Management., , , , and . UCC, page 702-707. IEEE Computer Society, (2014)Application of a New Service-Oriented Architecture (SOA) Paradigm on the Design of a Crisis Management Distributed System., , and . Int. J. Distributed Syst. Technol., 7 (2): 1-17 (2016)Identification of Critical Factors in Large Crisis Decision Making Processes Using Computational Tools: The Case of ATHENA., , , and . Int. J. Strateg. Inf. Technol. Appl., 8 (2): 11-28 (2017)Concise Guide to Databases - A Practical Introduction, Second Edition, , and . Undergraduate Topics in Computer Science Springer, (2021)