Author of the publication

Border Security Credibility Assessments via Heterogeneous Sensor Fusion.

, , , , and . IEEE Intelligent Systems, 25 (3): 41-49 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Are Users Threatened by Credibility Assessment Systems?, , , and . J. of Management Information Systems, 29 (4): 249-262 (2013)Embodied Conversational Agent - Based Kiosk for Automated Interviewing., , , , and . J. of Management Information Systems, 28 (1): 17-48 (2011)Mitigating bias blind spot via a serious video game., , , , , , , , , and 2 other author(s). Computers in Human Behavior, (2016)The Automatic Detection of Chronic Pain-Related Expression: Requirements, Challenges and the Multimodal EmoPain Dataset., , , , , , , , , and 8 other author(s). IEEE Trans. Affective Computing, 7 (4): 435-451 (2016)A Systems Approach to Countermeasures in Credibility Assessment Interviews., , , and . ICIS, Association for Information Systems, (2013)Predicting Users' Perceived Trust in Embodied Conversational Agents Using Vocal Dynamics., , , and . HICSS, page 579-588. IEEE Computer Society, (2012)Don't Lie to Me: The Impact of Deception on Vocalic and Linguistic Synchrony., , , and . EISIC, page 262-265. IEEE, (2013)A Rigidity Detection System for Automated Credibility Assessment., , , and . J. of Management Information Systems, 31 (1): 173-202 (2014)Robustness of Multiple Indicators in Automated Screening Systems for Deception Detection., , , , and . J. of Management Information Systems, 32 (4): 215-245 (2015)The Deception Sub-Challenge: The Data., , , , , , , , , and . INTERSPEECH, ISCA, (2016)