Author of the publication

Extracting Conflict Models from Interaction Traces in Virtual Collaborative Work.

, , , and . ER Workshops, volume 11158 of Lecture Notes in Computer Science, page 295-305. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collection of U.S. Extremist Online Forums: A Web Mining Approach., , , and . HICSS, page 70. IEEE Computer Society, (2007)Extracting Conflict Models from Interaction Traces in Virtual Collaborative Work., , , and . ER Workshops, volume 11158 of Lecture Notes in Computer Science, page 295-305. Springer, (2018)The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web., , , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 623-624. Springer, (2005)On the Topology of the Dark Web of Terrorist Groups., , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 367-376. Springer, (2006)SpidersRUs: Creating specialized search engines in multiple languages., , , , and . Decis. Support Syst., 45 (3): 621-640 (2008)Linking virtual and real-world identities., , and . ISI, page 49-54. IEEE, (2015)Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism., , , , , , , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 125-145. Springer, (2004)Detecting Offensive Language in Social Media to Protect Adolescent Online Safety., , , and . SocialCom/PASSAT, page 71-80. IEEE Computer Society, (2012)A Text Mining Model for Strategic Alliance Discovery., , , and . HICSS, page 3571-3580. IEEE Computer Society, (2012)Exploring Big Data Analytic Approaches to Cancer Blog Text Analysis., , and . IJHISI, 14 (4): 1-20 (2019)