Author of the publication

Current approaches to automated information evaluation and their applicability to Priority Intelligence Requirement answering.

, , , and . FUSION, page 1-9. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Application of KEFM to the Analysis of Healthcare Information., , and . KDD Workshop, page 441-452. AAAI Press, (1994)Constructive Induction On Decision Trees., and . IJCAI, page 645-650. Morgan Kaufmann, (1989)Wireless usage analysis for capacity planning and beyond: a data warehouse approach., , , , and . NOMS, page 905-917. IEEE, (2000)Understanding the Role of Context in the Interpretation of Complex Battlespace Intelligence., , , and . FUSION, page 1-8. IEEE, (2006)Augmenting the analyst via situation-dependent reasoning with trust-annotated facts., , , , , and . CogSIMA, page 17-24. IEEE, (2011)Feature construction: An analytic framework and an application to decision trees. University of Illinois Urbana-Champaign, USA, (1990)KDD-93: Progress and Challenges in Knowledge Discovery in Databases., , , and . AI Magazine, 15 (3): 77-82 (1994)An Application of Semantic Web Technologies to Situation Awareness., , , and . ISWC, volume 3729 of Lecture Notes in Computer Science, page 944-958. Springer, (2005)Knowledge Discovery in Databases: An Overview., , and . AI Magazine, 13 (3): 57-70 (1992)A Semantic Wiki Alerting Environment Incorporating Credibility and Reliability Evaluation., , and . STIDS, volume 713 of CEUR Workshop Proceedings, page 100-107. CEUR-WS.org, (2010)