Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Competitive Learning with Pairwise Constraints for Text., and . PRICAI, volume 8862 of Lecture Notes in Computer Science, page 370-382. Springer, (2014)Privacy Preserving Collaborative Business Process Management., and . Business Process Management Workshops, volume 4928 of Lecture Notes in Computer Science, page 306-315. Springer, (2007)Privacy-Preserving 1-n-p Negotiation Protocol., , and . HICSS, page 479. IEEE Computer Society, (2008)Business: Do you wanna sell more? Discovering Topics, Sentiments and Prediction of Ratings., and . ICCCT, page 133-138. ACM, (2017)SODAR (a tool): Use of IT in environmental management., , and . RAIT, page 681-686. IEEE, (2012)Collaborative Information Service: The Security Question., and . HICSS, page 348-357. IEEE Computer Society, (2016)