Works matching IS 13873326 AND DT 2011 AND VI 13 AND IP 1
Results: 12
Tag-only aging-counter localization for the R-LIM2 system.
- Published in:
- Information Systems Frontiers, 2011, v. 13, n. 1, p. 127, doi. 10.1007/s10796-009-9161-4
- By:
- Publication type:
- Article
Leveraging information sharing to configure supply chains.
- Published in:
- Information Systems Frontiers, 2011, v. 13, n. 1, p. 139, doi. 10.1007/s10796-009-9222-8
- By:
- Publication type:
- Article
Information control and terrorism: Tracking the Mumbai terrorist attack through twitter.
- Published in:
- Information Systems Frontiers, 2011, v. 13, n. 1, p. 33, doi. 10.1007/s10796-010-9275-8
- By:
- Publication type:
- Article
A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter.
- Published in:
- Information Systems Frontiers, 2011, v. 13, n. 1, p. 45, doi. 10.1007/s10796-010-9273-x
- By:
- Publication type:
- Article
Identity matching using personal and social identity features.
- Published in:
- Information Systems Frontiers, 2011, v. 13, n. 1, p. 101, doi. 10.1007/s10796-010-9270-0
- By:
- Publication type:
- Article
'Where's Farah?': Knowledge silos and information fusion by distributed collaborating teams.
- Published in:
- Information Systems Frontiers, 2011, v. 13, n. 1, p. 89, doi. 10.1007/s10796-010-9274-9
- By:
- Publication type:
- Article
Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict.
- Published in:
- Information Systems Frontiers, 2011, v. 13, n. 1, p. 61, doi. 10.1007/s10796-010-9272-y
- By:
- Publication type:
- Article
Tracking and disrupting dark networks: Challenges of data collection and analysis.
- Published in:
- Information Systems Frontiers, 2011, v. 13, n. 1, p. 5, doi. 10.1007/s10796-010-9271-z
- By:
- Publication type:
- Article
Domain-specific Chinese word segmentation using suffix tree and mutual information.
- Published in:
- Information Systems Frontiers, 2011, v. 13, n. 1, p. 115, doi. 10.1007/s10796-010-9278-5
- By:
- Publication type:
- Article
Computational approaches to suspicion in adversarial settings.
- Published in:
- Information Systems Frontiers, 2011, v. 13, n. 1, p. 21, doi. 10.1007/s10796-010-9279-4
- By:
- Publication type:
- Article
A multi-region empirical study on the internet presence of global extremist organizations.
- Published in:
- Information Systems Frontiers, 2011, v. 13, n. 1, p. 75, doi. 10.1007/s10796-010-9277-6
- By:
- Publication type:
- Article
Introduction to special issue on terrorism informatics.
- Published in:
- Information Systems Frontiers, 2011, v. 13, n. 1, p. 1, doi. 10.1007/s10796-010-9293-6
- By:
- Publication type:
- Article