Author of the publication

Defining and applying knowledge conversion processes to a visual analytics system.

, , , , , and . Computers & Graphics, 33 (5): 616-623 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to Swept Volume Generation for NC Machining using Gauss Map.. ETFA, page 1137-1140. IEEE, (2006)Requirements engineering process improvement: Analyzing the organizational culture impact and implementing an empirical study to evaluate the benefits of improvement., , , and . REBPM, page 15-18. IEEE Computer Society, (2014)From requirements elicitation to variability analysis using repertory grid: A cognitive approach., and . RE, page 46-55. IEEE Computer Society, (2015)Analysis of effectiveness of tsunami evacuation principles in the 2011 Great East Japan tsunami by using text mining., and . Multimedia Tools Appl., 75 (20): 12955-12966 (2016)Complete swept volume generation, Part I: Swept volume of a piecewise C1-continuous cutter at five-axis milling via Gauss map., and . Computer-Aided Design, 43 (4): 427-441 (2011)An Integrated Shell and Methodology for Rapid Development of Knowledge-Based Agents., , , , , and . AAAI/IAAI, page 250-257. AAAI Press / The MIT Press, (1999)Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment., and . RE, page 231-240. IEEE Computer Society, (2007)Exploratory Data Analysis of Acceleration Signals to Select Light-Weight and Accurate Features for Real-Time Activity Recognition on Smartphones., , and . Sensors, 13 (10): 13099-13122 (2013)Privacy-Preserving K-means Clustering with Multiple Data Owners., , , , , and . IACR Cryptology ePrint Archive, (2019)A methodology towards the adaptization of legacy systems using agent-oriented software engineering., and . SAC, page 1407-1414. ACM, (2016)