Author of the publication

Organizing Committee.

, and . AAAI Spring Symposium: AI Technologies for Homeland Security, AAAI, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy Logic and AI., , , , , , and . IJCAI, page 1673-1676. Morgan Kaufmann, (1993)Generalizing Term Subsumption Languages to Fuzzy Logic.. IJCAI, page 472-477. Morgan Kaufmann, (1991)Incorporating Trust into Combinatorial Auctions: What Does Trust Cost?, , , and . Web Intelligence/IAT Workshops, page 607-613. IEEE Computer Society, (2009)978-0-7695-3801-3.A Neural Network Approach to Predict Existing and Infill Oil Well Performance., , , and . IJCNN (4), page 408-413. IEEE Computer Society, (2000)0-7695-0619-4.A Formal Methodology for Analyzing Tradeoffs of Imprecise Requirements., and . International Journal of Software Engineering and Knowledge Engineering, 8 (2): 283-311 (1998)Dynamic vision sensor camera based bare hand gesture recognition., , , and . CIMSIVP, page 52-59. IEEE, (2011)A Framework for Splitting BDI Agents., and . LPAR, volume 2514 of Lecture Notes in Computer Science, page 160-174. Springer, (2002)A two-population evolutionary algorithm for feature extraction: Combining filter and wrapper., , and . IEEE Congress on Evolutionary Computation, page 736-743. IEEE, (2011)House of quality: A fuzzy logic-based requirements analysis., , and . Eur. J. Oper. Res., 117 (2): 340-354 (1999)A fuzzy logic based extension to Payton and Rosenblatt's command fusion method for mobile robot navigation., and . IEEE Trans. Syst. Man Cybern., 25 (6): 971-978 (1995)