default search action
Search dblp for Publications
export results for "toc:db/journals/ijidss/ijidss5.bht:"
@article{DBLP:journals/ijidss/AndersonRNKW18, author = {Graeme Anderson and David Reed and Simon Di Nucci and Anthony Kwong and Janet Wilson}, title = {Weapons effects modelling for safety applications}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {4}, pages = {253--276}, year = {2018}, url = {https://doi.org/10.1504/IJIDSS.2018.099878}, doi = {10.1504/IJIDSS.2018.099878}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/AndersonRNKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/BourqueGBCBO18, author = {Fran{\c{c}}ois{-}Alex Bourque and Raffaele Grasso and Ra{\'{u}}l Vicen Bueno and Giampaolo Cimino and Paolo Braca and John Osler}, title = {A decision support web service for allocating assets in counter-piracy operations given periodic environmental forecast updates}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {4}, pages = {314--331}, year = {2018}, url = {https://doi.org/10.1504/IJIDSS.2018.099897}, doi = {10.1504/IJIDSS.2018.099897}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/BourqueGBCBO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/MishraMM18, author = {Jyoti Prakash Mishra and Sambit Kumar Mishra and Anil Kumar Mishra}, title = {Opportunities with visualisation linked with virtualised data: a case study}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {4}, pages = {305--313}, year = {2018}, url = {https://doi.org/10.1504/IJIDSS.2018.099892}, doi = {10.1504/IJIDSS.2018.099892}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/MishraMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/SinhaRPAK18, author = {G. R. Sinha and K. Srujan Raju and Raj Kumar Patra and Daw Win Aye and Daw Thuzar Khin}, title = {Research studies on human cognitive ability}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {4}, pages = {298--304}, year = {2018}, url = {https://doi.org/10.1504/IJIDSS.2018.099891}, doi = {10.1504/IJIDSS.2018.099891}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/SinhaRPAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/TavakolianNAM18, author = {Niloofar Tavakolian and Azadeh Nazemi and Zohreh Azimifar and Iain Murray}, title = {Face recognition under occlusion for user authentication and invigilation in remotely distributed online assessments}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {4}, pages = {277--297}, year = {2018}, url = {https://doi.org/10.1504/IJIDSS.2018.099889}, doi = {10.1504/IJIDSS.2018.099889}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/TavakolianNAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/Au15, author = {T. Andrew Au}, title = {Evaluating digital targeting in a joint fires experiment}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {3}, pages = {186--204}, year = {2015}, url = {https://doi.org/10.1504/IJIDSS.2015.075475}, doi = {10.1504/IJIDSS.2015.075475}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/Au15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/Ingber15, author = {Lester Ingber}, title = {Biological impact on military intelligence: application or metaphor?}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {3}, pages = {173--185}, year = {2015}, url = {https://doi.org/10.1504/IJIDSS.2015.075474}, doi = {10.1504/IJIDSS.2015.075474}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/Ingber15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/KalyanGNH15, author = {Varun Kalyan and Subhashini Ganapathy and S. Narayanan and Raymond R. Hill}, title = {Integrated vehicle routing: a case study of unmanned aerial vehicle decision making}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {3}, pages = {205--225}, year = {2015}, url = {https://doi.org/10.1504/IJIDSS.2015.075476}, doi = {10.1504/IJIDSS.2015.075476}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/KalyanGNH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/MishraKBDC15, author = {Bhabani Shankar Prasad Mishra and Eui{-}Whan Kim and Guck{-}Cheol Bang and Satchidananda Dehuri and Sung{-}Bae Cho}, title = {Weapon target assignment problem: multi-objective formulation, optimisation using {MOPSO} and {TOPSIS}}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {3}, pages = {226--252}, year = {2015}, url = {https://doi.org/10.1504/IJIDSS.2015.075483}, doi = {10.1504/IJIDSS.2015.075483}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/MishraKBDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/El-Mahassni14, author = {Edwin El{-}Mahassni}, title = {Sensor selection and fusion using subjective logic}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {2}, pages = {95--108}, year = {2014}, url = {https://doi.org/10.1504/IJIDSS.2014.059960}, doi = {10.1504/IJIDSS.2014.059960}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/El-Mahassni14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/RyanRO14, author = {Peter John Ryan and Peter Ross and William Oliver}, title = {High fidelity simulation using the updated distributed interactive simulation standard}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {2}, pages = {109--126}, year = {2014}, url = {https://doi.org/10.1504/IJIDSS.2014.059959}, doi = {10.1504/IJIDSS.2014.059959}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/RyanRO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/TecuciSMB14, author = {Gheorghe Tecuci and David A. Schum and Dorin Marcu and Mihai Boicu}, title = {Computational approach and cognitive assistant for evidence-based reasoning in intelligence analysis}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {2}, pages = {146--172}, year = {2014}, url = {https://doi.org/10.1504/IJIDSS.2014.059976}, doi = {10.1504/IJIDSS.2014.059976}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/TecuciSMB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/VermeulenS14, author = {Arthur Vermeulen and Ralph Savelsberg}, title = {Interception of an aerodynamically stable weaving re-entry vehicle}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {2}, pages = {127--145}, year = {2014}, url = {https://doi.org/10.1504/IJIDSS.2014.059965}, doi = {10.1504/IJIDSS.2014.059965}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/VermeulenS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/FinkenstadtLBJHMS12, author = {Daniel Finkenstadt and Samuel George Lambrakos and Noam Bernstein and Verne L. Jacobs and Lulu Huang and Lou Massa and Andrew Shabaev}, title = {Construction of permittivity functions for high-explosives using density functional theory}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {1}, pages = {24--43}, year = {2012}, url = {https://doi.org/10.1504/IJIDSS.2012.053648}, doi = {10.1504/IJIDSS.2012.053648}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/FinkenstadtLBJHMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/GrantS12, author = {Matthew Grant and Mark G. Stewart}, title = {A systems model for probabilistic risk assessment of improvised explosive device attacks}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {1}, pages = {75--93}, year = {2012}, url = {https://doi.org/10.1504/IJIDSS.2012.053664}, doi = {10.1504/IJIDSS.2012.053664}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/GrantS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/UsbeckCR12, author = {Kyle Usbeck and Jeffrey Cleveland and William C. Regli}, title = {Network-centric {IED} detection planning}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {1}, pages = {44--74}, year = {2012}, url = {https://doi.org/10.1504/IJIDSS.2012.053665}, doi = {10.1504/IJIDSS.2012.053665}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/UsbeckCR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijidss/WeissBWTHH12, author = {Lora Weiss and Erica Briscoe and Elizabeth T. Whitaker and Ethan Trewhitt and Heather Hayes and John Horgan}, title = {A systems-level understanding of adversarial behaviour}, journal = {Int. J. Intell. Def. Support Syst.}, volume = {5}, number = {1}, pages = {4--23}, year = {2012}, url = {https://doi.org/10.1504/IJIDSS.2012.053676}, doi = {10.1504/IJIDSS.2012.053676}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijidss/WeissBWTHH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.