Author of the publication

Integrating Shallow and Deep Knowledge in the Design of an On-Line Process Monitoring System.

, , , , and . International Journal of Man-Machine Studies, 27 (5-6): 641-664 (1987)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Task dependent tools for intelligent automation., and . AI in Engineering, 4 (3): 126-143 (1989)Risk Assessment of Malicious Attacks Against Power Systems., , , , , and . IEEE Trans. Systems, Man, and Cybernetics, Part A, 39 (5): 1074-1085 (2009)Exploiting Physical and Design Knowledge in the Diagnosis of Complex Industrial Systems., , , and . ECAI, page 481-495. North-Holland, (1986)Representing Procedural Knowledge in Expert Systems: An Application to Process Control., , , and . IJCAI, page 345-352. Morgan Kaufmann, (1985)The security of power systems and the role of information and communication technologies: lessons from the recent blackouts., and . IJCIS, 4 (1/2): 32-45 (2008)A Diagnostic Algorithm based on Models at Different Level of Abstraction., , , and . IJCAI, page 1350-1355. Morgan Kaufmann, (1989)Integrated automation program (I.A.P.) for an electronic switching system., , , and . DAC, page 144-151. ACM, (1975)Integrating Shallow and Deep Knowledge in the Design of an On-Line Process Monitoring System., , , , and . International Journal of Man-Machine Studies, 27 (5-6): 641-664 (1987)Are security standards for electricity infrastructure a good choice for Europe? Evidence on cost and benefits from two case studies., and . IJCIS, 15 (3): 206-229 (2019)ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research., , and . CRITIS, volume 5141 of Lecture Notes in Computer Science, page 13-24. Springer, (2007)