


default search action
Information Fusion, Volume 10
Volume 10, Number 1, January 2009
- Belur V. Dasarathy:

A special issue on high-level information fusion. 1 
- Mieczyslaw M. Kokar, Gee Wah Ng:

High-level information fusion and situation awareness. 2-5 
- Dale A. Lambert:

A blueprint for higher-level fusion systems. 6-24 - Katia P. Sycara, Robin Glinton, Bin Yu, Joseph Andrew Giampapa, Sean Owens, Michael Lewis, Charles E. Grindle:

An integrated approach to high-level information fusion. 25-50 - Daniel W. McMichael, Geoff A. Jarrad, Simon Williams, Michael Kennett:

Force deployment analysis with generalized grammar. 51-69 - Eric G. Little, Galina L. Rogova:

Designing ontologies for higher level fusion. 70-82 - Mieczyslaw M. Kokar, Christopher J. Matheus

, Kenneth Baclawski:
Ontology-based situation awareness. 83-98 - Avi Pfeffer, Subrata Das, David Lawless, Brenda Ng:

Factored reasoning for monitoring dynamic team and goal formation. 99-106 - Shanchieh Jay Yang, Adam Stotz, Jared Holsopple, Moises Sudit, Michael E. Kuhl

:
High level information fusion for tracking and projection of multistage cyber attacks. 107-121 
Volume 10, Number 2, April 2009
- Belur V. Dasarathy:

An overview of the issue. 123 
- Damian M. Lyons, D. Frank Hsu:

Combining multiple scoring systems for target tracking using rank-score characteristics. 124-136 - Amanda C. Muller, S. Narayanan:

Cognitively-engineered multisensor image fusion for military applications. 137-149 - Eulanda Miranda dos Santos, Robert Sabourin, Patrick Maupin:

Overfitting cautious selection of classifier ensembles with genetic algorithms. 150-162 - Rafael Redondo, Filip Sroubek

, Sylvain Fischer, Gabriel Cristóbal
:
Multifocus image fusion using the log-Gabor transform and a Multisize Windows technique. 163-171 - Roland Hu, Robert I. Damper:

Optimal weighting of bimodal biometric information with specific application to audio-visual person identification. 172-182 - Mihai Cristian Florea, Anne-Laure Jousselme

, Éloi Bossé, Dominic Grenier:
Robust combination rules for evidence theory. 183-197 - Ron Zohar, Reuven Bar-Yehuda:

The maximum weight hierarchy matching problem. 198-206 
Volume 10, Number 3, July 2009
- Belur V. Dasarathy:

A special issue on Natural Computing Methods in Bioinformatics. 209 
- Francesco Masulli

, Sushmita Mitra
:
Natural Computing Methods in Bioinformatics. 210 
- Francesco Masulli

, Sushmita Mitra
:
Natural computing methods in bioinformatics: A survey. 211-216 - Luigi Palopoli

, Simona E. Rombo, Giorgio Terracina
, Giuseppe Tradigo, Pierangelo Veltri
:
Improving protein secondary structure predictions by prediction fusion. 217-232 - Giulio Pavesi

, Giorgio Valentini
:
Classification of co-expressed genes from DNA regulatory regions. 233-241 - Sushmita Mitra

, Ranajit Das, Haider Banka, Subhasis Mukhopadhyay:
Gene interaction - An evolutionary biclustering approach. 242-249 - Guy N. Brock

, William D. Beavis, Laura Salter Kubatko
:
Fuzzy logic and related methods as a screening tool for detecting gene regulatory networks. 250-259 - Rajat K. De, Anupam Ghosh

:
Linguistic recognition system for identification of some possible genes mediating the development of lung adenocarcinoma. 260-269 
Volume 10, Number 4, October 2009
- Belur V. Dasarathy:

A Special Issue on information fusion in computer security. 271 
- Giorgio Giacinto

, Fabio Roli
, Carlo Sansone
:
Information fusion in computer security. 272-273 
- Igino Corona

, Giorgio Giacinto
, Claudio Mazzariello
, Fabio Roli
, Carlo Sansone
:
Information fusion for computer security: State of the art and open issues. 274-284 - Benjamin Morin, Ludovic Mé, Hervé Debar

, Mireille Ducassé:
A logic-based model to support alert correlation in intrusion detection. 285-299 - Federico Maggi

, Matteo Matteucci, Stefano Zanero
:
Reducing false positives in anomaly detectors through fuzzy alert aggregation. 300-311 - Jouni Viinikka, Hervé Debar

, Ludovic Mé, Anssi Lehikoinen, Mika P. Tarvainen
:
Processing intrusion detection alert aggregates with time series modeling. 312-324 - Bon K. Sy:

Integrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS. 325-341 - Mauro Conti

, Roberto Di Pietro
, Luigi V. Mancini
, Alessandro Mei
:
Distributed data source verification in wireless sensor networks. 342-353 - Suvasini Panigrahi, Amlan Kundu, Shamik Sural

, Arun K. Majumdar:
Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning. 354-363 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














