Author of the publication

Interlinking educational Resources and the Web of Data - a Survey of Challenges and Approaches

, , , , , , and . Emerald Program: electronic Library and Information Systems, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RAW Architecture: Reflective and Adaptable Web Service Model., , , and . Int. J. Web Serv. Res., 2 (1): 36-53 (2005)An empirical study on the evaluation of interlinking tools on the Web of Data., , and . J. Inf. Sci., 40 (5): 637-648 (2014)Enhancing availability of learning resources on organic agriculture and agroecology.. Electron. Libr., 27 (5): 792-813 (2009)Exploring user-based recommender results in large learning object repositories: the case of MERLOT., , , and . RecSysTEL@RecSys, volume 1 of Procedia Computer Science, page 2859-2864. Elsevier, (2010)Moving from dataset metadata to semantics in ecological research: a case in translating EML to OWL., , , and . ICCS, volume 4 of Procedia Computer Science, page 1622-1630. Elsevier, (2011)Deploying Metadata on Blockchain Technologies., , and . MTSR, volume 755 of Communications in Computer and Information Science, page 38-49. Springer, (2017)Reusability Evaluation of Learning Objects Stored in Open Repositories Based on Their Metadata., , and . MTSR, volume 46 of Communications in Computer and Information Science, page 193-202. Springer, (2009)The Case for Ontologies in Expressing Decisions in Decentralized Energy Systems., , and . MTSR, volume 846 of Communications in Computer and Information Science, page 365-376. Springer, (2018)On the Search for Intrinsic Quality Metrics of Learning Objects., , , and . MTSR, volume 343 of Communications in Computer and Information Science, page 49-60. Springer, (2012)What are Information Security Ontologies Useful for?, , , and . MTSR, volume 544 of Communications in Computer and Information Science, page 51-61. Springer, (2015)