Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-driven risk analysis for poles in the electric grid., , , , and . ISGT, page 1-7. IEEE, (2016)Enhancing wide-area monitoring and control with intelligent alarm handling., , , and . ISGT Europe, page 1-5. IEEE, (2013)WordNetContext: Information Retrieval-friendly Access to WordNet Senses., , and . ProfS/KG4IR/Data:Search@SIGIR, volume 2127 of CEUR Workshop Proceedings, page 63-64. CEUR-WS.org, (2018)Data Fusion of Machine-Learning Methods for the TREC5 Routing Task (and other work)., , , , and . TREC, volume 500-238 of NIST Special Publication, National Institute of Standards and Technology (NIST), (1996)An adaptive nearest neighbor search for a parts acquisition ePortal., , , and . KDD, page 693-698. ACM, (2003)New Approaches to Cataloguing, Querying and Browsing Geospatial Metadata., , , and . MD, IEEE Computer Society, (1997)Telcordia LSI Engine: Implementation Scalability and Issues., , , , , and . RIDE-DM, page 51-58. IEEE Computer Society, (2001)Understanding events for wide-area situational awareness., , , , , , , , and . ISGT, page 1-5. IEEE, (2014)When Just One is Enough., and . CIKM Information Agents Workshop, page 14:1-14:8. (1995)Modeling Heterogeneous Software Components., , , , and . NGITS, (1995)