Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Formal Methodology for Analyzing Tradeoffs of Imprecise Requirements., and . International Journal of Software Engineering and Knowledge Engineering, 8 (2): 283-311 (1998)A fuzzy logic-based computational recognition-primed decision model., , , , , and . Inf. Sci., 177 (20): 4338-4353 (2007)A distributed adverse drug reaction detection system using intelligent agents with a fuzzy recognition-primed decision model., , , , , , and . Int. J. Intell. Syst., 22 (8): 827-845 (2007)Introduction to the special issue on emerging technologies for homeland security.. Commun. ACM, 47 (3): 32-35 (2004)Learning HMM-based cognitive load models for supporting human-agent teamwork., , and . Cogn. Syst. Res., 11 (1): 108-119 (2010)House of quality: A fuzzy logic-based requirements analysis., , and . Eur. J. Oper. Res., 117 (2): 340-354 (1999)Challenges to effective crisis management: Using information and communication technologies to coordinate emergency medical services and emergency department teams., , , , , and . Int. J. Medical Informatics, 78 (4): 259-269 (2009)A Formal Approach to the Analysis of Priorities of Imprecise Conflicting Requirements., and . Int. J. Artif. Intell. Tools, 5 (1-2): 185-198 (1996)Modeling and verifying multi-agent behaviors using predicate/transition nets., , , and . SEKE, page 193-200. ACM, (2002)Finding feature transformation functions using genetic algorithm., , and . GECCO (Companion), page 2061-2062. ACM, (2010)