Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keeping coherence among web sources., , , and . WIDM, page 16-23. ACM, (2001)Requirements and Design Issues of Spatial Data Handling Systems., , , and . CISM - Advances in Database Systems, volume 347 of CISM International Centre for Mechanical Sciences - Courses and Lectures, page 49-69. Springer, (1993)An Application of m-Ary Trees to The Design of Data Structures for Geometric Searching Problems., and . RAIRO Theor. Informatics Appl., 23 (2): 165-176 (1989)Movement based biometric authentication with smartphones., , , and . ICCST, page 235-239. IEEE, (2015)On Locally Presented Posets., , and . Theor. Comput. Sci., 70 (2): 251-260 (1990)Algorithms for the Relaxed Online Bin-Packing Model., , and . SIAM J. Comput., 30 (5): 1532-1551 (2000)Preserving Approximation in the Min-Weighted Set Cover Problem., , and . Discret. Appl. Math., 73 (1): 13-22 (1997)Towards a seamless digital Europe: the SSEDIC recommendations on digital identity management., , , , and . Open Identity Summit, volume P-237 of LNI, page 62-72. GI, (2014)Experiences and issues in the realization of e-government services., , , and . RIDE, page 143-. IEEE Computer Society, (2002)Access Keys Warehouse: A New Approach to the Development of Cooperative Information Systems., , , , and . CoopIS, page 46-56. IEEE Computer Society, (1999)