Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TNO Instance Search at TRECVID 2010., , , , and . TRECVID, National Institute of Standards and Technology (NIST), (2010)Mobile Touch: NFC-Like Interaction with Yesterday's Phones., , , and . CCNC, page 1-2. IEEE, (2009)Truffle tests for free - Replaying Ethereum smart contracts for transparency., and . CoRR, (2019)Rethinking Blockchain Security: Position Paper., , , , , , , and . iThings/GreenCom/CPSCom/SmartData, page 1273-1280. IEEE, (2018)Towards a Comprehensive Insight into the Thematic Organization of the Tor Hidden Services., , and . JISIC, page 220-223. IEEE, (2014)TNO instance search submission 2011., , , and . TRECVID, National Institute of Standards and Technology (NIST), (2011)Investigating sentence severity with judicial open data - A case study on sentencing high-tech crime in the Dutch criminal justice system., , and . CoRR, (2021)Dynamic Public Service Mediation., and . EGOV, volume 6228 of Lecture Notes in Computer Science, page 327-338. Springer, (2010)Authorship Analysis on Dark Marketplace Forums., , , and . EISIC, page 1-8. IEEE Computer Society, (2015)Real-time task recognition based on knowledge workers' computer activities., , , and . ECCE, page 152-159. ACM, (2012)