Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning Classifiers to Detect Malicious Websites., , , and . SSN, volume 1950 of CEUR Workshop Proceedings, page 14-17. CEUR-WS.org, (2017)malicious and benign websites., , , and . (November 2018)Primary School Students' Choices in Writing Opinion Essays: Using ICT Combined with Self-Regulated Strategies., , and . WCCE, volume 515 of IFIP Advances in Information and Communication Technology, page 323-334. Springer, (2017)Squeak, an Invisible Laboratory for Teachers as Learners., and . Virtual Enterprises and Collaborative Networks, volume 283 of IFIP, page 333-340. Springer, (2008)What if You Created Your Own Digital Adventurers' Park?., and . C5, page 78-83. IEEE Computer Society, (2009)The Acceptance of Motion Detection Devices by the Elderly., , and . WCCE, volume 515 of IFIP Advances in Information and Communication Technology, page 189-195. Springer, (2017)Exploratory Study Using Self-Regulated Self-Development (SRSD) and Technology in the Context of the Classroom., , and . Encyclopedia of Education and Information Technologies, Springer International Publishing, (2020)Assisting Elderly Non-computer-Literate People with Computer-Based Communications.. Encyclopedia of Education and Information Technologies, Springer International Publishing, (2020)Primary School Classroom Writing Interventions Using Technologies., , and . Encyclopedia of Education and Information Technologies, Springer International Publishing, (2020)Optimal Design of ICPT Systems Applied to Electric Vehicle Battery Charge., , , and . IEEE Trans. Ind. Electron., 56 (6): 2140-2149 (2009)