Author of the publication

What Do Academic Users Really Want from an Adaptive Learning System?.

, , , and . UMAP, volume 5535 of Lecture Notes in Computer Science, page 454-460. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EgoNav: exploring networks through egocentric spatializations., , , and . AVI, page 563-570. ACM, (2012)Mining Dense Structures to Uncover Anomalous Behaviour in Financial Network Data., , and . MSM/MUSE, volume 7472 of Lecture Notes in Computer Science, page 60-76. Springer, (2011)On Layering Directed Acyclic Graphs., and . Graph Drawing, volume 05191 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, (2005)Characterizing Wikipedia pages using edit network motif profiles., , and . SMUC, page 45-52. ACM, (2011)Reports on the Workshops Held at the Sixth International AAAI Conference on Weblogs and Social Media., , , , , , , , , and 4 other author(s). AI Magazine, 34 (1): 101- (2013)Using a Significant Spanning Tree to Draw a Directed Graph., and . J. Graph Algorithms Appl., 12 (3): 293-317 (2008)What Do Academic Users Really Want from an Adaptive Learning System?., , , and . UMAP, volume 5535 of Lecture Notes in Computer Science, page 454-460. Springer, (2009)k-Level Crossing Minimization Is NP-Hard for Trees., and . WALCOM, volume 6552 of Lecture Notes in Computer Science, page 70-76. Springer, (2011)An Analysis of Anonymity in the Bitcoin System., and . SocialCom/PASSAT, page 1318-1326. IEEE Computer Society, (2011)Airdrops and Privacy: A Case Study in Cross-Blockchain Analysis., , and . ICDM Workshops, page 63-70. IEEE, (2018)