Author of the publication

Countering Terrorism through Information and Privacy Protection Technologies.

, and . IEEE Secur. Priv., 4 (6): 18-27 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Normative framework and computational models for simulating and assessing command and control processes., , , , and . Simul. Model. Pract. Theory, 14 (4): 454-479 (2006)Countering Terrorism through Information and Privacy Protection Technologies., and . IEEE Secur. Priv., 4 (6): 18-27 (2006)Multitarget Tracking Algorithm Parallelization for Distributed-Memory Computing Systems., , , and . HPDC, page 412-421. IEEE Computer Society, (1996)Fingerprinting Leading Indicators of WMD Terrorism: An Integrated Modeling Approach., , , , , and . AAAI Spring Symposium: Technosocial Predictive Analytics, page 72-75. AAAI, (2009)Shared-Memory Parallelization of the Data Association Problem in Multitarget Tracking., , , and . IEEE Trans. Parallel Distributed Syst., 8 (10): 993-1005 (1997)Organizing Committee., and . AAAI Spring Symposium: AI Technologies for Homeland Security, AAAI, (2005)Efficient information retrieval on the World Wide Web using adaptable and mobile Java agents., , and . SMC, page 2219-2224. IEEE, (1998)Countering terrorism through information technology., , , and . Commun. ACM, 47 (3): 36-43 (2004)Automated hardware design using genetic programming, VHDL, and FPGAs., , , , and . SMC, page 2184-2189. IEEE, (1998)Distributed- and shared-memory parallelizationsof assignment-based data association formultitarget tracking., , and . Ann. Oper. Res., (1999)