Author of the publication

Introduction to the special section on social computing, behavioral-cultural modeling, and prediction.

, , and . ACM TIST, 4 (3): 51:1-51:2 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fusing dynamic multisource information for an equipment database., , and . Data Mining and Knowledge Discovery: Theory, Tools, and Technology, volume 5098 of SPIE Proceedings, page 166-173. SPIE, (2003)Toward building a comprehensive data mart., , , and . Data Mining and Knowledge Discovery: Theory, Tools, and Technology, volume 5433 of SPIE Proceedings, page 236-245. SPIE, (2004)The pearls of using real-world evidence to discover social groups., and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 5812 of SPIE Proceedings, page 309-320. SPIE, (2005)Introduction to the special section on social computing, behavioral-cultural modeling, and prediction., , and . ACM TIST, 4 (3): 51:1-51:2 (2013)An Application of a Recurrent Neural Model for Parsing Natural Language.. Int. J. Artif. Intell. Tools, 6 (3): 397-419 (1997)Connecting Sparsely Distributed Similar Bloggers., , , , and . ICDM, page 11-20. IEEE Computer Society, (2009)Buddy: fusing multiple search results together., , , , and . Data Mining and Knowledge Discovery: Theory, Tools, and Technology, volume 5098 of SPIE Proceedings, page 155-165. SPIE, (2003)Comparing various algorithms for discovering social groups with uni-party data., , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 5812 of SPIE Proceedings, page 168-179. SPIE, (2005)Detecting people of interest from internet data sources., and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6241 of SPIE Proceedings, page 62410H. SPIE, (2006)Introduction to special issue on social computing, behavioral modeling, and prediction., , , , and . ACM Trans. Knowl. Discov. Data, 3 (2): 6:1-6:3 (2009)