Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Suspicious Activity Using Different Rule Engines - Comparison of BaseVISor, Jena and Jess Rule Engines., and . RuleML, volume 5321 of Lecture Notes in Computer Science, page 73-80. Springer, (2008)Comprehension of RDF Data Using Situation Theory and Concept Maps., , and . STIDS, volume 1304 of CEUR Workshop Proceedings, page 25-31. CEUR-WS.org, (2014)Situations and policies., , , , and . CogSIMA, page 7-14. IEEE, (2012)Situational Awareness from Social Media., , and . STIDS, volume 1097 of CEUR Workshop Proceedings, page 87-93. CEUR-WS.org, (2013)Inferring relations and individuals relevant to a situation: An example., , , and . CogSIMA, page 186-194. IEEE, (2014)Semantic Policy Enforcement and Reconciliation for Information Exchange in XMPP., , , , and . STIDS, volume 808 of CEUR Workshop Proceedings, page 22-29. CEUR-WS.org, (2011)Reusability of knowledge for deriving latent situational information in EW scenarios., , , , , and . MILCOM, page 114-119. IEEE, (2016)