The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Henrik Legind Larsen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nasrullah Memon, Henrik Legind Larsen
    Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:906-913 [Conf]
  2. Nasrullah Memon, Henrik Legind Larsen
    Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks Using Investigative Data Mining. [Citation Graph (0, 0)][DBLP]
    ADMA, 2006, pp:1037-1048 [Conf]
  3. Nasrullah Memon, Henrik Legind Larsen
    Structural Analysis and Destabilizing Terrorist Networks. [Citation Graph (0, 0)][DBLP]
    DMIN, 2006, pp:296-302 [Conf]
  4. Maria J. Martín-Bautista, Daniel Sánchez, María Amparo Vila Miranda, Henrik Legind Larsen
    Measuring Effectiveness in Fuzzy Information Retrieval. [Citation Graph (0, 0)][DBLP]
    FQAS, 2000, pp:396-402 [Conf]
  5. Henrik Legind Larsen, Troels Andreasen, Henning Christiansen
    Knowledge Discovery for Flexible Querying. [Citation Graph (0, 0)][DBLP]
    FQAS, 1998, pp:227-235 [Conf]
  6. Jørgen Fischer Nilsson, Henrik Legind Larsen
    Fuzzy Querying Using Concept Object Algebra. [Citation Graph (0, 0)][DBLP]
    FQAS, 1996, pp:75-87 [Conf]
  7. Henrik Legind Larsen
    An Approach to Flexible Information Access Systems using Soft Computing. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  8. Nasrullah Memon, Daniel Ortiz Arroyo, Henrik Legind Larsen
    Investigative Data Mining: A General Framework. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Intelligence, 2004, pp:384-387 [Conf]
  9. Nasrullah Memon, Henrik Legind Larsen
    Practical Algorithms for Destabilizing Terrorist Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:389-400 [Conf]
  10. Mikael Heinze, Daniel Ortiz Arroyo, Henrik Legind Larsen, Francisco Rodríguez-Henríquez
    Fuzzeval: A Fuzzy Controller-Based Approach in Adaptive Learning for Backgammon Game. [Citation Graph (0, 0)][DBLP]
    MICAI, 2005, pp:224-233 [Conf]
  11. Ramon López de Mántaras, P. F. Kerdiles, Henrik Legind Larsen
    Validation Methods and Tools for Knowledge-Based Systems (VALID). [Citation Graph (0, 0)][DBLP]
    Wissensbasierte Systeme, 1989, pp:516-526 [Conf]
  12. Henrik Legind Larsen
    Generalized Double Modulo 11 Check Digit Error Detection. [Citation Graph (0, 0)][DBLP]
    BIT, 1983, v:23, n:3, pp:303-307 [Journal]
  13. Sushmita Mitra, Henrik Legind Larsen
    Special Issue on Web mining using soft computing. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2004, v:148, n:1, pp:1-3 [Journal]
  14. Henrik Legind Larsen
    Efficient Andness-Directed Importance Weighted Averaging Operators. [Citation Graph (0, 0)][DBLP]
    International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2003, v:11, n:Supplement-1, pp:67-82 [Journal]
  15. Maria J. Martín-Bautista, María Amparo Vila Miranda, Henrik Legind Larsen
    A Fuzzy Genetic Algorithm Approach to an Adaptive Information Retrieval Agent. [Citation Graph (0, 0)][DBLP]
    JASIS, 1999, v:50, n:9, pp:760-771 [Journal]
  16. Ronald R. Yager, Henrik Legind Larsen
    Retrieving Information by Fuzzification of Queries. [Citation Graph (0, 0)][DBLP]
    J. Intell. Inf. Syst., 1993, v:2, n:4, pp:421-441 [Journal]
  17. Henrik Legind Larsen, Ronald R. Yager
    A framework for fuzzy recognition technology. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2000, v:30, n:1, pp:65-76 [Journal]
  18. Nasrullah Memon, David L. Hicks, Henrik Legind Larsen
    How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks. [Citation Graph (0, 0)][DBLP]
    ADMA, 2007, pp:430-441 [Conf]
  19. Nasrullah Memon, David L. Hicks, Henrik Legind Larsen
    Dependence Centrality: Identifying Dependence of Nodes in Terrorist Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:366- [Conf]
  20. Nasrullah Memon, David L. Hicks, Henrik Legind Larsen
    Harvesting Terrorists Information from Web. [Citation Graph (0, 0)][DBLP]
    IV, 2007, pp:664-671 [Conf]

  21. Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. [Citation Graph (, )][DBLP]


  22. Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies. [Citation Graph (, )][DBLP]


  23. Fuzzy data mining of term associations for flexible query answering. [Citation Graph (, )][DBLP]


  24. A genetic fuzzy classifier to adaptive user interest profiles with feature selection. [Citation Graph (, )][DBLP]


  25. Multiplicative and Implicative Importance Weighted Averaging Aggregation Operators with Accurate Andness Direction. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002