Author of the publication

Requirements for a Nutrition Education Demonstrator.

, , , , , , , and . REFSQ, volume 6606 of Lecture Notes in Computer Science, page 48-53. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time Mesh: An Educational Historical Game., , , and . DIGITEL, page 171-173. IEEE, (2012)Requirements for a Nutrition Education Demonstrator., , , , , , , and . REFSQ, volume 6606 of Lecture Notes in Computer Science, page 48-53. Springer, (2011)A Privacy Maturity Model for Cloud Storage Services., , , , , , , and . IEEE CLOUD, page 944-945. IEEE, (2014)A meta-analysis for security threats over the Web ecosystem., , , , , , , , and . NOMS, page 838-842. IEEE, (2016)Formation of Probabilistic Concepts through Observations Containing Discrete and Continuous Attributes., and . FLAIRS Conference, page 526-531. AAAI Press, (2004)Towards a taxonomy for security threats on the web ecosystem., , , , , , , , , and . NOMS, page 584-590. IEEE, (2016)A File Recommendation Model For Cloud Storage Systems., , , , , and . SBSI, page 111-118. ACM, (2015)A cloud-based recommendation model., , , , , and . EATIS, page 23:1-23:4. ACM, (2014)Security Threats in Cloud Computing Models: Domains and Proposals., , , , , and . IEEE CLOUD, page 383-389. IEEE, (2013)Systematic Mapping Study On Security Threats in Cloud Computing, , , , and . CoRR, (2013)