Author of the publication

Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?

, , and . Sicherheit, volume P-228 of LNI, page 229-241. GI, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verwendung pseudonymer Identitäten zur Unterstützung von Learning Analytics in offenen Lernumgebungen(Using Pseudonymous Identities to support Learning Analytics in Open Learning Environments)., , and . DeLFI/GMW Workshops, volume 2092 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)Towards Ontology-Based Training-Less Multi-label Text Classification., , , and . NLDB, volume 10859 of Lecture Notes in Computer Science, page 389-396. Springer, (2018)Automatische Sammlung von Aktivitäten Lernender in offenen Lernumgebungen und deren Nutzung in einer Lerntagebuchanwendung., and . DeLFI, volume P-273 of LNI, page 203-214. Gesellschaft für Informatik, Bonn, (2017)From Task Classification Towards Similarity Measures for Recommendation in Crowdsourcing Systems., , and . CoRR, (2017)Perceived Task Similarities for Task Recommendation in Crowdsourcing Systems., , , and . WWW (Companion Volume), page 585-590. ACM, (2016)Concept, Design and First Evaluation of a Mobile Learning Diary Application with Access to a Learning Record Store., , and . ARTEL@EC-TEL, volume 1997 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?, , and . Sicherheit, volume P-228 of LNI, page 229-241. GI, (2014)