Author of the publication

A fuzzy MHT algorithm applied to text-based information tracking.

, , and . IEEE Trans. Fuzzy Syst., 10 (3): 360-374 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Hidden Markov Models using Non-Negative Matrix Factorization, and . CoRR, (2008)Semantic depth and markup complexity., , and . SMC, page 2138-2143. IEEE, (2003)Round-off error propagation in Durbin's, Levinson's, and Trench's algorithms.. ICASSP, page 498-501. IEEE, (1979)A fuzzy MHT algorithm applied to text-based information tracking., , and . IEEE Trans. Fuzzy Syst., 10 (3): 360-374 (2002)Asymptotic Behavior of Attack Graph Games., and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 104-112. Springer, (2018)Approximation by superpositions of a sigmoidal function.. Math. Control. Signals Syst., 2 (4): 303-314 (1989)Overview of Control and Game Theory in Adaptive Cyber Defenses., , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)Network awareness and mobile agent systems., , , and . IEEE Commun. Mag., 36 (7): 44-49 (1998)Fixed Hypercube Embedding., , and . Inf. Process. Lett., 25 (1): 35-39 (1987)A Language of Life: Characterizing People Using Cell Phone Tracks., and . CSE (4), page 495-501. IEEE Computer Society, (2009)