Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding the continued use of intra-organizational blogs: An adaptive habituation model., , , , and . Computers in Human Behavior, (2015)Stippling and Silhouettes Rendering in Geometry-Image Space., , , and . Rendering Techniques, page 193-200. Eurographics Association, (2005)Exploiting multiuser diversity in reservation random access., , , and . IEEE Trans. Wireless Communications, 5 (9): 2548-2554 (2006)Multiresolution Volume Simplification and Polygonization., and . Volume Graphics, volume 45 of ACM International Conference Proceeding Series, page 87-94. Eurographics Association, (2003)Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness., , , , , , and . CoRR, (2017)Walk, Not Wait: Faster Sampling Over Online Social Networks., , , , and . CoRR, (2014)Parameter Estimation of Photovoltaic Models via Cuckoo Search., , , , , and . J. Applied Mathematics, (2013)TrustRank: a Cold-Start tolerant recommender system., , , , and . Enterprise IS, 9 (2): 117-138 (2015)An overview on probability undirected graphs and their applications in image processing., , and . Neurocomputing, (2018)A New Scheme on Privacy Preserving Association Rule Mining., , and . PKDD, volume 3202 of Lecture Notes in Computer Science, page 484-495. Springer, (2004)