Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fusing restricted information., , and . CoRR, (2017)A study on class-specifically discounted belief for ensemble classifiers., , and . MFI, page 614-619. IEEE, (2008)An Empirical Comparison of Bayesian and Credal Set Theory for Discrete State Estimation., , and . IPMU (1), volume 80 of Communications in Computer and Information Science, page 80-89. Springer, (2010)Information Fusion for Autonomous Robotic Weeding., , and . GI Jahrestagung, volume P-154 of LNI, page 2461-2473. GI, (2009)An empirical comparison of Bayesian and credal combination operators., , and . FUSION, page 1-8. IEEE, (2010)An empirical comparison of Bayesian and credal networks for dependable high-level information fusion., , and . FUSION, page 1-8. IEEE, (2008)Information acquisition strategies for Bayesian network-based decision support., and . FUSION, page 1-8. IEEE, (2010)Evaluating precise and imprecise State-Based Anomaly detectors for maritime surveillance., , , , and . FUSION, page 1-8. IEEE, (2010)A data association framework for general information fusion., , and . MFI, page 233-239. IEEE, (2015)The IPATCH System for Maritime Surveillance and Piracy Threat Classification., , , , , , , and . EISIC, page 200. IEEE Computer Society, (2016)