Author of the publication

Towards intelligent mapping applications: a study of elements found in cognitive maps.

, and . IUI, page 309-312. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two Challenging Domains.. ACM Comput. Surv., 28 (4es): 12 (1996)A plan-based mission control center for autonomous vehicles., and . IUI, page 277-279. ACM, (2004)A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities., , , and . IEEE Access, (2018)AWDRAT: A Cognitive Middleware System for Information Survivability., , , , , , , and . AI Magazine, 28 (3): 73-91 (2007)The Innovative Applications of Artificial Intelligence Conference: Past and Future.. AI Magazine, 17 (4): 15-20 (1996)One-Push Sharing: Facilitating Picture Sharing from Camera Phones., , and . Mobile HCI, volume 3160 of Lecture Notes in Computer Science, page 466-470. Springer, (2004)Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance., , , , , , , , , and 4 other author(s). CoRR, (2021)Runtime Protection of Real-time Critical Control Applications against Known Threats., , , and . IEEE Des. Test, 37 (6): 88-95 (2020)Evolutionary design of complex software (EDCS)., and . ACM SIGSOFT Softw. Eng. Notes, 20 (5): 18-22 (1995)Preventing Kernel Hacks with HAKCs., , , , , , and . NDSS, The Internet Society, (2022)