Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Groups in Non-Structured Data., , , and . Complex Adaptive Systems, volume 12 of Procedia Computer Science, page 412-417. Elsevier, (2012)Book Review: 'Data Localisation Laws and Policy'.. Eur. J. Law Technol., (2019)Book Review: European Data Protection Regulation, Journalism, and Traditional Publishers.. Eur. J. Law Technol., (2022)Book Review: 'The Making Available Right'.. Eur. J. Law Technol., (2020)Knowledge Organizations., and . Encyclopedia of Knowledge Management, IGI Global, (2011)Social Capital Knowledge., and . Encyclopedia of Knowledge Management, IGI Global, (2011)Fast Abductive Reasoning over Ontologies., and . AAAI Fall Symposium: Capturing and Using Patterns for Evidence Detection, volume FS-06-02 of AAAI Technical Report, page 85-90. AAAI Press, (2006)On the Classification of Ideal Secret Sharing Schemes., and . J. Cryptol., 4 (2): 123-134 (1991)On the Classification of Idea Secret Sharing Schemes., and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 278-285. Springer, (1989)