Get my own profile
Public access
View all24 articles
0 articles*
available
not available
Based on funding mandates
Co-authors
John M. CarrollDistinguished Professor of Information Sciences and Technology, Pennsylvania State UniversityVerified email at ist.psu.edu
Pamela J. WisniewskiAssociate Professor, Vanderbilt UniversityVerified email at Vanderbilt.edu
Heather Richter LipfordProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
Shane E Halse, Ph.D.University of CincinnatiVerified email at uc.edu
Andrea Hoplight TapiaPenn State UniversityVerified email at ist.psu.edu
Rob GraceUniversity of CincinnatiVerified email at uc.edu
Mamtaj AkterAssistant Professor, New York Institute of TechnologyVerified email at vanderbilt.edu
Joseph JohnsonAssistant Professor, University of CincinnatiVerified email at uc.edu
Patrick C. ShihAssociate Professor of Informatics, Indiana University BloomingtonVerified email at iu.edu
Yu WuPh.D., Penn State University, GoogleVerified email at psu.edu
Leena AlghamdiUniversity of Central FloridaVerified email at ucf.edu
Zaina AljalladUndergraduate ResearcherVerified email at knights.ucf.edu
Frederick BenabenProf. IMT Mines Albi CGI / Adj.-Prof. Georgia Tech ISyE - Head Security & Crisis Management teamVerified email at mines-albi.fr
Aurélie MontarnalIMT Mines AlbiVerified email at mines-albi.fr
Julien CocheGlobantVerified email at mines-albi.fr
Michael J LackiProfessor of Wildlife Ecology and Management, University of KentuckyVerified email at uky.edu
Kyungsik HanHanyang UniversityVerified email at hanyang.ac.kr
Madiha TabassumNortheastern UniversityVerified email at northeastern.edu
Chhaya ChouhanUniversity of Central FloridaVerified email at knights.ucf.edu
Christy LaPerriereUndergraduate Researcher at University of Central FloridaVerified email at knights.ucf.edu
Follow