Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applications of Signal Detection Theory to Geographic Information Science., and . Cartographica, 44 (3): 145-158 (2009)Sensor-to-Symbol Reasoning for Embedded Intelligence., , and . AAAI Spring Symposium: Embedded Reasoning, AAAI, (2010)PRONTOE - A Case Study for Developing Ontologies for Operations., , , , and . KEOD, page 17-25. SciTePress, (2013)Impact of Indoor Location Information Reliability on Users' Trust of an Indoor Positioning System., and . GIScience, volume 7478 of Lecture Notes in Computer Science, page 258-269. Springer, (2012)Human Spatial Behavior, Sensor Informatics, and Disaggregate Data., , , , , and . COSIT, volume 8116 of Lecture Notes in Computer Science, page 224-242. Springer, (2013)A conceptual model of trust for indoor positioning systems., , , and . ISA, page 7-14. ACM, (2011)WiFi-based enhanced positioning systems: accuracy through mapping, calibration, and classification., , and . ISA, page 3-9. ACM, (2010)Adapting to the Machine: Integrating GIS into Qualitative Research., and . Cartographica, 39 (1): 55-66 (2004)Reasoner Performance on Ontologies for Operations., , , and . KEOD, page 304-311. SciTePress, (2014)Meeting the Demand: Building a Cybersecurity Degree Program With Limited Resources., and . FIE, page 1-7. IEEE, (2018)