Author of the publication

Measuring Border Security for Resource Allocation.

. ADT, volume 10576 of Lecture Notes in Computer Science, page 361-365. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Methods for learning classifier combinations: no clear winner., and . SAC, page 1038-1043. ACM, (2005)The Challenges of Seeking Security While Respecting Privacy., and . ISIPS, volume 5661 of Lecture Notes in Computer Science, page 1-10. Springer, (2008)Cross-Evaluation: A new model for information system evaluation., and . J. Assoc. Inf. Sci. Technol., 57 (5): 614-628 (2006)Effectiveness of the Finite Impulse Response Model in Content-Based fMRI Image Retrieval., , and . MICCAI (2), volume 4792 of Lecture Notes in Computer Science, page 742-750. Springer, (2007)Combining the Evidence of Multiple Query Representations for Information Retrieval., , , and . Inf. Process. Manag., 31 (3): 431-448 (1995)Using the Information Structure Model to Compare Profile-Based Information Filtering Systems., , and . Inf. Retr., 6 (1): 75-97 (2003)Rutgers Filtering Work at TREC 2002: Adaptive and Batch., , , , , and . TREC, volume 500-251 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2002)Logical Analysis of Data in the TREC-9 Filtering Track., , and . TREC, volume 500-249 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2000)Eliciting Uncertain Resilience Information for Risk Mitigation., , and . HICSS, page 1-10. ScholarSpace, (2022)Identification of effective predictive variables for document qualities., , , , , , , , and . ASIST, volume 40 of Proc. Assoc. Inf. Sci. Technol., page 221-229. Wiley, (2003)