Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Model of Learning by Incremental Analogical Reasoning and Debugging.. AAAI, page 45-48. AAAI Press, (1983)Qualitative Reasoning about Cyber Intrusions., , , , and . AAAI Workshops, volume WS-17 of AAAI Technical Report, AAAI Press, (2017)Active Perception for Cyber Intrusion Detection and Defense., , , , , , , and . AAAI Workshop: Artificial Intelligence for Cyber Security, volume WS-16-03 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.FUZZBUSTER: Towards Adaptive Immunity from Cyber Threats., , , , , and . SASO Workshops, page 137-140. IEEE Computer Society, (2011)The Role of Object Primitives in Natural Language Processing., and . IJCAI, page 522-524. William Kaufmann, (1979)A SILK Graphical UI for Defeasible Reasoning, with a Biology Causal Process Example., , , , , , , and . RuleML Challenge, volume 649 of CEUR Workshop Proceedings, CEUR-WS.org, (2010)POIROT - Integrated Learning of Web Service Procedures., , , , , , , , and . AAAI, page 1274-1279. AAAI Press, (2008)An Approach to Mixed-Initiative Management of Heterogeneous Software Agent Teams., , and . HICSS, IEEE Computer Society, (1999)Comparing Strategic and Tactical Responses to Cyber Threats., , , , , and . SASO Workshops, page 35-40. IEEE Computer Society, (2013)Trust and Adaptation in STRATUS., , and . TrustCom/ISPA/IUCC, page 1711-1716. IEEE Computer Society, (2013)