Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling Activity Management Instead of Task Realization.. DSS, volume 238 of Frontiers in Artificial Intelligence and Applications, page 51-62. IOS Press, (2012)Developing Shared Context Within Group Stories., and . CRIWG, volume 3706 of Lecture Notes in Computer Science, page 232-247. Springer, (2005)Representing Operational Knowledge by Contextual Graphs., , and . IBERAMIA-SBIA, volume 1952 of Lecture Notes in Computer Science, page 245-258. Springer, (2000)Groupware System Design and the Context Concept., , , and . CSCWD (Selected papers), volume 3168 of Lecture Notes in Computer Science, page 45-54. Springer, (2004)Context Modeling: Task Model and Practice Model.. CONTEXT, volume 4635 of Lecture Notes in Computer Science, page 122-135. Springer, (2007)Explaining for sharing context in communities.. CSCWD, page 819-826. IEEE, (2011)Contextual and contextualized knowledge: an application in subway control., , and . Int. J. Hum. Comput. Stud., 48 (3): 357-373 (1998)Introduction to the Special Issue Üsing context in applications".. Int. J. Hum. Comput. Stud., 48 (3): 303-305 (1998)Looking for a Synergy between Human and Artificial Cognition., , , , and . CONTEXT, volume 8175 of Lecture Notes in Computer Science, page 45-58. Springer, (2013)Context-Based Constraints in Security: Motivations and First Approach., and . CWS@CONTEXT, volume 146 of Electronic Notes in Theoretical Computer Science, page 85-100. Elsevier, (2005)