Author of the publication

Border Security Credibility Assessments via Heterogeneous Sensor Fusion.

, , , , and . IEEE Intelligent Systems, 25 (3): 41-49 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaborative Cross-Border Security Infrastructure and Systems: Identifying Policy, Managerial and Technological Challenges., , , and . IJEP, 4 (2): 21-38 (2013)AdaBoost-based sensor fusion for credibility assessment., , and . ISI, page 224-226. IEEE, (2012)An Investigation of Problem Formulation Comprehensiveness on Solution Novelty and Elegance in Team Collaboration., , , , and . HICSS, page 777-786. IEEE Computer Society, (2016)Automated Group Facilitation for Gathering Wide Audience End-User Requirements., , , , and . HICSS, page 195-204. IEEE Computer Society, (2013)The Last Research Mile: Achieving Both Rigor and Relevance in Information Systems Research., , , and . J. of Management Information Systems, 32 (3): 10-47 (2015)Border Security Credibility Assessments via Heterogeneous Sensor Fusion., , , , and . IEEE Intelligent Systems, 25 (3): 41-49 (2010)Toward an Objective Linguistic-Based Measure of Perceived Embodied Conversational Agent Power and Likeability., , and . Int. J. Hum. Comput. Interaction, 30 (6): 495-516 (2014)The affective outcomes of using influence tactics in embodied conversational agents., and . Computers in Human Behavior, (2014)Embodied Conversational Agent - Based Kiosk for Automated Interviewing., , , , and . J. of Management Information Systems, 28 (1): 17-48 (2011)Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues., , , , and . ACM Trans. Management Inf. Syst., 4 (2): 9:1-9:21 (2013)