Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

First steps towards a context aware ontology-driven reporting system., , and . I-SEMANTICS, page 103-108. ACM, (2012)Semantic Data Management: Sensor-Based Port Security Use Case., , , , and . EISIC, page 155-158. IEEE, (2013)Text Annotation Handbook: A Practical Guide for Machine Learning Projects., , , , , , , and . CoRR, (2023)Analysis of Weak Signals for Detecting Lone Wolf Terrorists., , , , , and . EISIC, page 197-204. IEEE Computer Society, (2012)Information Fusion for Port Security Decision Support., , , and . EISIC, page 292. IEEE Computer Soecity, (2011)Dynamic and Context Aware Reporting of Observations from the Field for Situation Assessment in Crisis Situation: An Integrated System for Information-Gathering and Sense-Making., and . ISCRAM-med, volume 233 of Lecture Notes in Business Information Processing, page 132-139. Springer, (2015)A data association framework for general information fusion., , and . MFI, page 233-239. IEEE, (2015)Harvesting and analysis of weak signals for detecting lone wolf terrorists., , , , , and . Secur. Informatics, 2 (1): 11 (2013)An Ontology-based Adaptive Reporting Tool., , and . STIDS, volume 808 of CEUR Workshop Proceedings, page 85-88. CEUR-WS.org, (2011)A Quantitative Approach to Risk and Cost Assessment in Supply Chain Management., and . EISIC, page 180-183. IEEE Computer Society, (2016)