Author of the publication

Towards the formal representation of temporal aspects of Enemy/Threat Courses Of Action.

, , , and . FUSION, page 240-247. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Putting Your Customers' Questions to Work.. New Directions in Question Answering, page 1-7. AAAI Press, (2003)Thomson Reuters' Submission to the FEIII 2017 Challenge Non-scored Tasks., , , , and . DSMM@SIGMOD, page 7:1-7:4. ACM, (2017)An Information Provider's Wish List for a Next Generation Big Data End-to-End Information System., , and . CIDR, www.cidrdb.org, (2015)Bringing Commercial Question Answering to the Web.. New Directions in Question Answering, page 31-46. AAAI Press, (2004)New metrics for blog mining., , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6570 of SPIE Proceedings, page 65700I. SPIE, (2007)Augmenting the analyst via situation-dependent reasoning with trust-annotated facts., , , , , and . CogSIMA, page 17-24. IEEE, (2011)Uses of Ontologies in Open Source Blog Mining., , and . OIC, volume 213 of Frontiers in Artificial Intelligence and Applications, page 37-55. IOS Press, (2007)Metrics For Monitoring A Social-Political Blogosphere: A Malaysian Case Study., , and . IEEE Internet Comput., 14 (2): 34-44 (2010)Lycos Retriever: An Information Fusion Engine.. HLT-NAACL, The Association for Computational Linguistics, (2006)Situational Awareness from Social Media., , and . STIDS, volume 1097 of CEUR Workshop Proceedings, page 87-93. CEUR-WS.org, (2013)