Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structuring the Web: a Logical Schema for Web pages and Sites., , and . DIWeb, page 103-113. University of Toronto Press, (2002)Cloud in Mobile Platforms: Managing Authentication/Authorization., , , , , and . WorldCIST (2), volume 931 of Advances in Intelligent Systems and Computing, page 361-372. Springer, (2019)A Network-Based Analysis of a Worksite Canteen Dataset., , , , and . Big Data Cogn. Comput., 5 (1): 11 (2021)Emerging structures of P2P networks induced by social relationships., , , and . Comput. Commun., 31 (3): 620-628 (2008)Terrorism and War: Twitter Cascade Analysis., , , , and . IDC, volume 798 of Studies in Computational Intelligence, page 309-318. Springer, (2018)An adaptive overlay network inspired by social behaviour., , , and . J. Parallel Distributed Comput., 70 (3): 282-295 (2010)Food Recommendation in a Worksite Canteen., , , , and . COMPLEXIS, page 117-124. SCITEPRESS, (2021)From Specification to Hardware Device: A Synthesis Algorithm., , and . ICFEM, volume 2885 of Lecture Notes in Computer Science, page 665-681. Springer, (2003)Evaluating the community partition quality of a network with a genetic programming approach., , , , and . COMPLEX NETWORKS, volume 693 of Studies in Computational Intelligence, page 299-308. Springer, (2016)A Heuristic to Explore Trust Networks Dynamics., , , and . IDC, volume 511 of Studies in Computational Intelligence, page 67-76. Springer, (2013)