Author of the publication

Video-Based Deception Detection.

, , , and . Intelligence and Security Informatics, volume 135 of Studies in Computational Intelligence, Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaborative Cross-Border Security Infrastructure and Systems: Identifying Policy, Managerial and Technological Challenges., , , and . IJEP, 4 (2): 21-38 (2013)The Use of Integrated Organization and Information Systems Models in Building and Delivering Business Applications., , and . IEEE Trans. Knowl. Data Eng., 1 (3): 406-409 (1989)Bringing automated support to large groups: The Burr-Brown experience., , , and . Information & Management, 18 (3): 111-121 (1990)Video-Based Deception Detection., , , and . Intelligence and Security Informatics, volume 135 of Studies in Computational Intelligence, Springer, (2008)Special Issue: Multiple Dimensions of Value in Information Systems., and . J. of Management Information Systems, 29 (4): 97-102 (2013)Collaboration Engineering with ThinkLets to Pursue Sustained Success with Group Support Systems., , and . J. of Management Information Systems, 19 (4): 31-64 (2003)Enabling the Effective Involvement of Multiple Users: Methods and Tools for Collaborative Software Engineering., , , , and . J. of Management Information Systems, 14 (3): 179-222 (1998)Special Issue: Decision Support Systems for Teams, Groups, and Organizations.. J. of Management Information Systems, 8 (3): 3-6 (1992)Whither the Pen-Based Interface?, , , and . J. of Management Information Systems, 9 (3): 71-90 (1993)A Technology Transition Model Derived from Field Investigation of GSS Use Aboard the U.S.S. CORONADO., , , , , and . J. of Management Information Systems, 15 (3): 151-196 (1999)