default search action
Information Fusion, Volume 10
Volume 10, Number 1, January 2009
- Belur V. Dasarathy:
A special issue on high-level information fusion. 1
- Mieczyslaw M. Kokar, Gee Wah Ng:
High-level information fusion and situation awareness. 2-5
- Dale A. Lambert:
A blueprint for higher-level fusion systems. 6-24 - Katia P. Sycara, Robin Glinton, Bin Yu, Joseph Andrew Giampapa, Sean Owens, Michael Lewis, Charles E. Grindle:
An integrated approach to high-level information fusion. 25-50 - Daniel W. McMichael, Geoff A. Jarrad, Simon Williams, Michael Kennett:
Force deployment analysis with generalized grammar. 51-69 - Eric G. Little, Galina L. Rogova:
Designing ontologies for higher level fusion. 70-82 - Mieczyslaw M. Kokar, Christopher J. Matheus, Kenneth Baclawski:
Ontology-based situation awareness. 83-98 - Avi Pfeffer, Subrata Das, David Lawless, Brenda Ng:
Factored reasoning for monitoring dynamic team and goal formation. 99-106 - Shanchieh Jay Yang, Adam Stotz, Jared Holsopple, Moises Sudit, Michael E. Kuhl:
High level information fusion for tracking and projection of multistage cyber attacks. 107-121
Volume 10, Number 2, April 2009
- Belur V. Dasarathy:
An overview of the issue. 123
- Damian M. Lyons, D. Frank Hsu:
Combining multiple scoring systems for target tracking using rank-score characteristics. 124-136 - Amanda C. Muller, S. Narayanan:
Cognitively-engineered multisensor image fusion for military applications. 137-149 - Eulanda Miranda dos Santos, Robert Sabourin, Patrick Maupin:
Overfitting cautious selection of classifier ensembles with genetic algorithms. 150-162 - Rafael Redondo, Filip Sroubek, Sylvain Fischer, Gabriel Cristóbal:
Multifocus image fusion using the log-Gabor transform and a Multisize Windows technique. 163-171 - Roland Hu, Robert I. Damper:
Optimal weighting of bimodal biometric information with specific application to audio-visual person identification. 172-182 - Mihai Cristian Florea, Anne-Laure Jousselme, Éloi Bossé, Dominic Grenier:
Robust combination rules for evidence theory. 183-197 - Ron Zohar, Reuven Bar-Yehuda:
The maximum weight hierarchy matching problem. 198-206
Volume 10, Number 3, July 2009
- Belur V. Dasarathy:
A special issue on Natural Computing Methods in Bioinformatics. 209
- Francesco Masulli, Sushmita Mitra:
Natural Computing Methods in Bioinformatics. 210
- Francesco Masulli, Sushmita Mitra:
Natural computing methods in bioinformatics: A survey. 211-216 - Luigi Palopoli, Simona E. Rombo, Giorgio Terracina, Giuseppe Tradigo, Pierangelo Veltri:
Improving protein secondary structure predictions by prediction fusion. 217-232 - Giulio Pavesi, Giorgio Valentini:
Classification of co-expressed genes from DNA regulatory regions. 233-241 - Sushmita Mitra, Ranajit Das, Haider Banka, Subhasis Mukhopadhyay:
Gene interaction - An evolutionary biclustering approach. 242-249 - Guy N. Brock, William D. Beavis, Laura Salter Kubatko:
Fuzzy logic and related methods as a screening tool for detecting gene regulatory networks. 250-259 - Rajat K. De, Anupam Ghosh:
Linguistic recognition system for identification of some possible genes mediating the development of lung adenocarcinoma. 260-269
Volume 10, Number 4, October 2009
- Belur V. Dasarathy:
A Special Issue on information fusion in computer security. 271
- Giorgio Giacinto, Fabio Roli, Carlo Sansone:
Information fusion in computer security. 272-273
- Igino Corona, Giorgio Giacinto, Claudio Mazzariello, Fabio Roli, Carlo Sansone:
Information fusion for computer security: State of the art and open issues. 274-284 - Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé:
A logic-based model to support alert correlation in intrusion detection. 285-299 - Federico Maggi, Matteo Matteucci, Stefano Zanero:
Reducing false positives in anomaly detectors through fuzzy alert aggregation. 300-311 - Jouni Viinikka, Hervé Debar, Ludovic Mé, Anssi Lehikoinen, Mika P. Tarvainen:
Processing intrusion detection alert aggregates with time series modeling. 312-324 - Bon K. Sy:
Integrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS. 325-341 - Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Distributed data source verification in wireless sensor networks. 342-353 - Suvasini Panigrahi, Amlan Kundu, Shamik Sural, Arun K. Majumdar:
Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning. 354-363
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.