Author of the publication

A network-based analysis to understand food-habits of a multi-company canteen's customers.

, , , , and . iiWAS, page 352-356. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Lotos in Workflow Specification., , and . ICEIS (3), page 364-369. (2003)Virtualization for Effective Risk-Free Network Security Assessment., , , and . Int. J. Online Eng., 10 (5): 21-28 (2014)Efficient Node PageRank Improvement via Link-building using Geometric Deep Learning., , , , and . ACM Trans. Knowl. Discov. Data, 17 (3): 38:1-38:22 (April 2023)Pick-up & Deliver in Maintenance Management of Renewable Energy Power Plants., , , , , , and . FedCSIS, volume 21 of Annals of Computer Science and Information Systems, page 579-585. (2020)Direct trust assignment using social reputation and aging., , , , and . J. Ambient Intell. Humaniz. Comput., 8 (2): 167-175 (2017)A model for a web-based learning system., , , and . Inf. Syst. Frontiers, 9 (2-3): 267-282 (2007)Information categorization in web pages and sites., , and . Web Intell. Agent Syst., 3 (3): 183-198 (2005)Hidden Schema Extraction in Web Documents., , and . DNIS, volume 2822 of Lecture Notes in Computer Science, page 42-52. Springer, (2003)The Effect of Topology on the Attachment Process in Trust Networks., , , and . IDC, volume 570 of Studies in Computational Intelligence, page 377-382. Springer, (2014)Reliable peers and useful resources: Searching for the best personalised learning path in a trust- and recommendation-aware environment., , and . Inf. Sci., 180 (10): 1893-1907 (2010)