Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving Synergy in Collaborative Education., , and . IEEE Software, 14 (6): 58-65 (1997)Representing Operational Planning Knowledge., , , and . IEEE Trans. Syst. Man Cybern., 16 (6): 774-787 (1986)Situations and policies., , , , and . CogSIMA, page 7-14. IEEE, (2012)Problems and prospects for formally representing and reasoning about enemy courses of action., , , and . FUSION, page 1-8. IEEE, (2008)Understanding the Role of Context in the Interpretation of Complex Battlespace Intelligence., , , and . FUSION, page 1-8. IEEE, (2006)Issues and Challenges in Situation Assessment (Level 2 Fusion)., , , , , , , and . J. Adv. Inf. Fusion, 1 (2): 122-139 (2006)Augmenting the analyst via situation-dependent reasoning with trust-annotated facts., , , , , and . CogSIMA, page 17-24. IEEE, (2011)Educating Industrial-strength Software Engineers., and . CSEE&T, page 139-150. IEEE Computer Society, (1998)PRONET: Network trust assessment based on incomplete provenance., , , , , , , , and . MILCOM, page 1213-1218. IEEE, (2011)Towards the formal representation of temporal aspects of Enemy/Threat Courses Of Action., , , and . FUSION, page 240-247. IEEE, (2009)