Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Concealment of Intent in Transportation Screening: A Proof of Concept., , , , , , , , , and 2 other author(s). IEEE Trans. Intell. Transp. Syst., 10 (1): 103-112 (2009)Group support systems for very large groups: A peer review process to filter brainstorming input., , and . AMCIS, page 16. Association for Information Systems, (2006)Testing Various Modes of Computer-Based Training for Deception Detection., , , , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 411-417. Springer, (2004)Detecting Deception in Person-of-Interest Statements., , , , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 504-509. Springer, (2006)Layers of Learning: Facilitation in the Distributed Classroom., , and . HICSS (2), page 598-609. IEEE Computer Society, (1997)Rebuilding Sarajevo Using Partnerships., , and . HICSS (2), page 479-485. IEEE Computer Society, (1997)A Quasi-experiment to Determine the Impact of a Computer Based Deception Detection Training System: The Use of Agent99 Trainer in the U.S. Military., , , , , , and . HICSS, IEEE Computer Society, (2005)Information Technology Augmentation of The Skilled Facilitator Approach., , and . HICSS, page 42. IEEE Computer Society, (2003)Experiences Developing a Virtual Environment to Support Disaster Relief with the United States Navy's Commander Third Fleet., , , , , , , and . HICSS, IEEE Computer Society, (2000)Experiences Using Group Support Systems to Improve Strategic Planning in the Air Force., , , , and . HICSS (1), page 515-524. IEEE Computer Society, (1998)