Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating Issues Related to the Modeling of Insurgent Recruitment., , , and . SBP, volume 6007 of Lecture Notes in Computer Science, page 375-381. Springer, (2010)An Integrated Bayesian Approach to Shape Representation and Perceptual Organization., , , , , and . Shape Perception in Human and Computer Vision, Springer, (2013)Optimized Influence Targeting for Adoption in Social Networks., , and . AAAI Fall Symposium: Social Networks and Social Contagion, volume FS-12-08 of AAAI Technical Report, AAAI, (2012)A systems-level understanding of adversarial behaviour., , , , , and . Int. J. Intell. Def. Support Syst., 5 (1): 4-23 (2012)Cues to Deception in Social Media Communications., , and . HICSS, page 1435-1443. IEEE Computer Society, (2014)Conceptual complexity and the bias/variance tradeoff, and . Cognition, 118 (1): 2--16 (January 2011)Model Docking Using Knowledge-Level Analysis., , , and . SBP, volume 6589 of Lecture Notes in Computer Science, page 105-112. Springer, (2011)Technology Futures From Passive Crowdsourcing., , and . IEEE Trans. Comput. Soc. Syst., 3 (1): 23-31 (2016)Determining credibility from social network structure., , , and . ASONAM, page 1418-1424. ACM, (2013)Bridging the Micro-Macro Divide: Multi-Scale Modeling of Technology Adoption., , and . CogSci, cognitivesciencesociety.org, (2011)