Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time series modeling of Army Mission Command communication networks: an event-driven analysis., and . Comput. Math. Organ. Theory, 22 (4): 467-486 (2016)Team performance in a series of regional and national US cybersecurity defense competitions: Generalizable effects of training and functional role specialization., , , and . Comput. Secur., (2021)Extra: explaining team recommendation in networks., , , , and . RecSys, page 492-493. ACM, (2018)Computing Team Process Measures From the Structure and Content of Broadcast Collaborative Communications., , , and . IEEE Trans. Comput. Soc. Syst., 4 (2): 26-39 (2017)Cognition and communication: situational awareness and tie preservation in disrupted task environments., , , and . Netw. Sci., 8 (4): 508-542 (2020)Extended Review on the User Evaluation of Teleoperation Interfaces for Professional Service Robots., , , , and . AMCIS, Association for Information Systems, (2023)Predicting proficiency in cyber defense team exercises., , , , , , and . MILCOM, page 776-781. IEEE, (2016)Computational Cognition Ideation Challenge., , , , , , , and . CogSci, cognitivesciencesociety.org, (2014)Know Your Enemy: Applying Cognitive Modeling in Security Domain., and . CogSci, cognitivesciencesociety.org, (2016)Symbolic Deep Networks: A Psychologically Inspired Lightweight and Efficient Approach to Deep Learning., , and . Top. Cogn. Sci., 14 (4): 702-717 (2022)