Author of the publication

A Method for Identifying Malicious Activity in Collaborative Systems with Maps.

, , , , and . ASONAM, page 334-337. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of human mobility on police allocation., and . ISI, page 125-127. IEEE, (2017)A process for separation of crosscutting grid concerns., , , , and . SAC, page 1569-1574. ACM, (2006)A User Interface to Support Dialogue and Negotiation in Participatory Simulations., , , , and . MABS, volume 5269 of Lecture Notes in Computer Science, page 127-140. Springer, (2008)Towards a Common Sense Base in Portuguese for the Linked Open Data Cloud., , , and . PROPOR, volume 7243 of Lecture Notes in Computer Science, page 128-138. Springer, (2012)Promoting performance and separation of concerns for data mining applications on the grid., , and . Future Gener. Comput. Syst., 23 (1): 100-106 (2007)Open Government and Citizen Participation in Law Enforcement via Crowd Mapping., , , and . IEEE Intell. Syst., 27 (4): 63-69 (2012)Building and Analyzing the Brazilian Legal Knowledge Graph., , , , , and . AI4LEGAL/KGSum@ISWC, volume 3257 of CEUR Workshop Proceedings, page 22-31. CEUR-WS.org, (2022)An architecture for interactive knowledge based systems., and . CLIHC, page 239-242. ACM, (2003)Railways Networks - Challenges for IoT Underground Wireless Communications., , , , and . LATINCOM, page 1-6. IEEE, (2018)WikiCrimes as an Open Institutional Environment: A Study Case., , and . IAT, page 25-30. IEEE Computer Society, (2013)978-1-4799-2902-3.