Author of the publication

Mediawiki Administrators' Tutorial Guide: Install, Manage, and Customize Your Mediawiki Installation

. (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving V2V Charge Sharing Coordination using the Hungarian Algorithm., , , , , and . VTC2023-Spring, page 1-6. IEEE, (2023)Search Rank Fraud De-Anonymization in Online Systems., , , and . HT, page 174-182. ACM, (2018)The Suitability of the Java Language for Computer-Graphics and Visualisation Research., and . IV, page 273-. IEEE Computer Society, (2002)Mediawiki Administrators' Tutorial Guide: Install, Manage, and Customize Your Mediawiki Installation. (2007)Cache-Oblivious Scanline Algorithm Design.. CGIV, page 22-30. IEEE Computer Society, (2007)Can Large Language Models Fix Data Annotation Errors? An Empirical Study Using Debatepedia for Query-Focused Text Summarization., , , , and . EMNLP (Findings), page 10245-10255. Association for Computational Linguistics, (2023)Dataset Annotation and Model Building for Identifying Biases in News Narratives., , and . Text2Story@ECIR, volume 3671 of CEUR Workshop Proceedings, page 5-15. CEUR-WS.org, (2024)Visibility Computations - Scanline Algorithms and Techniques.. ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 25-37. Springer, (2007)Fraud De-Anonymization for Fun and Profit., , , and . ACM Conference on Computer and Communications Security, page 115-130. ACM, (2018)Legal Knowledge Framework for Identifying Water, Energy, Food and Climate Nexus.. DoCoPe@JURIX, volume 1105 of CEUR Workshop Proceedings, CEUR-WS.org, (2013)