Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distinguishing the Picture Captions on the World Wide Web (Poster)., and . ACM DL, page 263. ACM, (1997)Top-Down Statistical Estimation on a Database.. SIGMOD Conference, page 135-145. ACM Press, (1983)SIGMOD Record 13(4).Logical Modeling of Deceptive Negative Persuasion.. PERSUASIVE, volume 4744 of Lecture Notes in Computer Science, page 105-108. Springer, (2007)Path planning by optimal-path-map construction for homogeneous-cost two-dimensional regions., and . ICRA, page 1924-1929. IEEE, (1990)Experiments with Deceptive Software Responses to Buffer-Based Attacks., , and . IAW, page 43-44. IEEE, (2003)Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace.. AINA Workshops (1), page 563-568. IEEE Computer Society, (2007)Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus., and . ICDF2C, volume 88 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 115-130. Springer, (2011)An Authoring System for Intelligent Procedural-Skill Tutors., and . IEEE Intelligent Systems, 13 (3): 61-69 (1998)Measuring the Effectiveness of Honeypot Counter-Counterdeception.. HICSS, IEEE Computer Society, (2006)Inferring Depictions in Natural-Language Captions for Efficient Access to Picture Data.. Inf. Process. Manag., 30 (3): 379-388 (1994)