Author of the publication

Joining the Dots: Using Linked Data to Navigate between Features and Observational Data.

, , , , , and . ISESS, volume 448 of IFIP Advances in Information and Communication Technology, page 121-130. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Learning Towards Intelligent Vehicle Fault Diagnosis., , , , , , and . IJCNN, page 1-7. IEEE, (2020)A Model of Non-elemental Associative Learning in the Mushroom Body Neuropil of the Insect Brain., , and . ICANNGA (1), volume 4431 of Lecture Notes in Computer Science, page 488-497. Springer, (2007)A model of associative learning in the mushroom body., , and . Biol. Cybern., 99 (2): 89-103 (2008)An international standard conceptual model for sharing references to hydrologic features, , and . Journal of Hydrology, (2012)Joining the Dots: Using Linked Data to Navigate between Features and Observational Data., , , , , and . ISESS, volume 448 of IFIP Advances in Information and Communication Technology, page 121-130. Springer, (2015)SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks., , and . IEEE Trans. Mob. Comput., 16 (10): 2927-2940 (2017)A Cluster-Based Approach to Consensus Based Distributed Task Allocation., , , and . PDP, page 428-431. IEEE Computer Society, (2014)Critical Analysis of Hypothesis Tests in Federal Information Processing Standard (140-2)., , , , and . Entropy, 24 (5): 613 (2022)Sensitivity and uniformity in statistical randomness tests., , , , and . J. Inf. Secur. Appl., (2022)Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators., , , , and . ARES, page 105:1-105:11. ACM, (2023)