Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boundary and Feature Recognition at the University of Iowa., and . TRECVID, National Institute of Standards and Technology (NIST), (2004)Temporal video analysis., and . AREA, page 81-88. ACM, (2008)Workshop on Domain Engineering as a Research Agenda for Software Engineering and Knowledge Engineering., and . SEKE, page 391. Knowledge Systems Institute, (1995)Selecting Reusable Components Using Algebraic Specifications.. AMAST, page 57-69. Springer, (1991)Software Engineering (on) the World Wide Web (Workshop).. ICSE, page 676. ACM, (1997)Ethical Web Agents.. Comput. Networks ISDN Syst., 28 (1&2): 127-136 (1995)Experiments in Novelty, Genes and Questions at the University of Iowa., , , , , , and . TREC, volume 500-255 of NIST Special Publication, page 678-685. National Institute of Standards and Technology (NIST), (2003)Novel Results and Some Answers - The University of Iowa TREC 11 Results., and . TREC, volume 500-251 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2002)Experiments in Questions and Relationships at the University of Iowa., and . TREC, volume 500-266 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2005)Cluster-Based Adaptive and Batch Filtering., , and . TREC, volume 500-242 of NIST Special Publication, page 211-220. National Institute of Standards and Technology (NIST), (1998)