Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Normative framework and computational models for simulating and assessing command and control processes., , , , and . Simul. Model. Pract. Theory, 14 (4): 454-479 (2006)Countering Terrorism through Information and Privacy Protection Technologies., and . IEEE Secur. Priv., 4 (6): 18-27 (2006)Multitarget Tracking Algorithm Parallelization for Distributed-Memory Computing Systems., , , and . HPDC, page 412-421. IEEE Computer Society, (1996)Shared-Memory Parallelization of the Data Association Problem in Multitarget Tracking., , , and . IEEE Trans. Parallel Distributed Syst., 8 (10): 993-1005 (1997)Fingerprinting Leading Indicators of WMD Terrorism: An Integrated Modeling Approach., , , , , and . AAAI Spring Symposium: Technosocial Predictive Analytics, page 72-75. AAAI, (2009)Organizing Committee., and . AAAI Spring Symposium: AI Technologies for Homeland Security, AAAI, (2005)Countering terrorism through information technology., , , and . Commun. ACM, 47 (3): 36-43 (2004)Efficient information retrieval on the World Wide Web using adaptable and mobile Java agents., , and . SMC, page 2219-2224. IEEE, (1998)Automated hardware design using genetic programming, VHDL, and FPGAs., , , , and . SMC, page 2184-2189. IEEE, (1998)Distributed- and shared-memory parallelizationsof assignment-based data association formultitarget tracking., , and . Ann. Oper. Res., (1999)