Author of the publication

Towards intelligent mapping applications: a study of elements found in cognitive maps.

, and . IUI, page 309-312. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AWDRAT: A Cognitive Middleware System for Information Survivability., , , , , , , and . AI Magazine, 28 (3): 73-91 (2007)The Innovative Applications of Artificial Intelligence Conference: Past and Future.. AI Magazine, 17 (4): 15-20 (1996)A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities., , , and . IEEE Access, (2018)Two Challenging Domains.. ACM Comput. Surv., 28 (4es): 12 (1996)A plan-based mission control center for autonomous vehicles., and . IUI, page 277-279. ACM, (2004)One-Push Sharing: Facilitating Picture Sharing from Camera Phones., , and . Mobile HCI, volume 3160 of Lecture Notes in Computer Science, page 466-470. Springer, (2004)Evolutionary design of complex software (EDCS)., and . ACM SIGSOFT Softw. Eng. Notes, 20 (5): 18-22 (1995)Runtime Protection of Real-time Critical Control Applications against Known Threats., , , and . IEEE Des. Test, 37 (6): 88-95 (2020)Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance., , , , , , , , , and 4 other author(s). CoRR, (2021)Preventing Kernel Hacks with HAKCs., , , , , , and . NDSS, The Internet Society, (2022)