default search action
Marion G. Ceruti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [c35]Kevin Adams, Alexander Wassell, Marion G. Ceruti, Ernesto Castro, Sandi F. Lehan, John W. Mitchell:
Emergency-management situational-awareness prototype (EMSAP). CogSIMA 2011: 110-114 - 2010
- [c34]Jeff Waters, Kevin Adams, Sandi F. Lehan, Marion G. Ceruti, Stuart Harvey Rubin:
Participation in IT-Standards Organizations Supports Multi-Agency First-Responder Command-and-Control System. CAINE 2010: 162-169 - [c33]Kevin Adams, Sandi F. Lehan, Marion G. Ceruti, Stuart Harvey Rubin, Jeff Waters:
Toward an integrated system for command and control net-centric web services and sustainment: Application to Homeland Security. IRI 2010: 374-377 - [c32]Eva Blomqvist, Marion G. Ceruti, Jeff Waters, Don McGarry:
A Decision-making Format for the Semantic Web. WOP 2010
2000 – 2009
- 2009
- [j4]Jeff Waters, Brenda J. Powers, Marion G. Ceruti:
Global Interoperability Using Semantics, Standards, Science and Technology (GIS3T). Comput. Stand. Interfaces 31(6): 1158-1166 (2009) - [c31]Nghia Xuan Tran, Hoa Van Phan, Vince V. Dinh, Jeffrey Ellen, Bryan Berg, Jason Lum, Eldridge Alcantara, Mike Bruch, Marion G. Ceruti, Charles Kao, Daniel Garcia, Sunny Fugate, LorRaine Duffy:
Wireless Data Glove for Gesture-Based Robotic Control. HCI (2) 2009: 271-280 - [c30]Marion G. Ceruti, Vincent Vinh Dinh, Nghia Xuan Tran, Hoa Van Phan, LorRaine Duffy, Tu-Anh Ton, Guy Leonard, Emily W. Medina, Omar Amezcua, Sunny Fugate, Gary J. Rogers, Robert Luna, Jeffrey Ellen:
Wireless communication glove apparatus for motion tracking, gesture recognition, data transmission, and reception in extreme environments. SAC 2009: 172-176 - [c29]Jeff Waters, James Eitelberg, Ritesh Patel, Marion G. Ceruti:
Investigation of information flow in hierarchical organizations using agent-based modeling. SpringSim 2009 - 2008
- [c28]Dwight R. Wilcox, Marion G. Ceruti:
A Structured Service-Centric Approach for the Integration of Command and Control Components. IEEE SCC (2) 2008: 5-12 - 2007
- [j3]Marion G. Ceruti, Stuart Harvey Rubin:
Infodynamics: Analogical analysis of states of matter and information. Inf. Sci. 177(4): 969-987 (2007) - [c27]Emily W. Medina, Sunny Fugate, LorRaine Duffy, Dennis Magsombol, Omar Amezcua, Gary J. Rogers, Marion G. Ceruti:
Next-Generation Tactical-Situation-Assessment Technology (TSAT): Chat. ICWE 2007: 526-532 - [c26]Marion G. Ceruti, LorRaine Duffy, Y. Meriah Arias-Thode:
Analysis of Policy and Standards for Joint C4ISR Network Technologies. POLICY 2007: 273 - 2006
- [c25]Marion G. Ceruti, Subrata Das, Adam Ashenfelter, Gary Raven, Richard R. Brooks, Moises Sudit, Genshe Chen, Edward Wright:
Pedigree Information for Enhanced Situation and Threat Assessment. FUSION 2006: 1-8 - [c24]Marion G. Ceruti, Tedd L. Wright, Brenda J. Powers, Scott C. McGirr:
Data Pedigree and Strategies for Dynamic Level-One Sensor Data Fusion. FUSION 2006: 1-5 - 2005
- [c23]Marion G. Ceruti, Stuart Harvey Rubin:
Infodynamics III: Information Integration and Tractability. IRI 2005: 25-31 - [c22]Stuart Harvey Rubin, Marion G. Ceruti, Wei Dai:
The role of computational intelligence in data mining. IRI 2005: 192-198 - [c21]Stuart Harvey Rubin, Marion G. Ceruti:
Intelligent component-centric programming. IRI 2005: 265-269 - [c20]Bhavani Thuraisingham, Latifur Khan, Chris Clifton, John A. Maurer, Marion G. Ceruti:
Dependable Real-Time Data Mining. ISORC 2005: 158-165 - 2004
- [c19]Marion G. Ceruti:
States of matter, information organization and dimensions of expressiveness. Conf. Computing Frontiers 2004: 120-124 - 2003
- [j2]Marion G. Ceruti:
Data Management Challenges and Development for Military Information Systems. IEEE Trans. Knowl. Data Eng. 15(5): 1059-1068 (2003) - [c18]Marion G. Ceruti, Stuart Harvey Rubin:
Dynamic Three-Value Logic in Decentralized Time-Critical Domains. ISADS 2003: 131-138 - [c17]Marion G. Ceruti, Joan L. Kaina:
Enhancing Dependability of the Battlefield Single Integrated Picture through Metrics for Modeling and Simulation of Time-Critical Scenarios. WORDS Fall 2003: 69- - 2002
- [c16]Marion G. Ceruti:
States of Matter and States of Information. CAINE 2002: 170-175 - [c15]Stuart Harvey Rubin, Robert J. Rush Jr., Marion G. Ceruti:
Application of Object-Oriented Design to Knowledge Amplification by Structured Expert Randomization (KASER). WORDS 2002: 343-349 - 2001
- [c14]Bhavani Thuraisingham, Chris Clifton, John A. Maurer, Marion G. Ceruti:
Real-Time Data Mining of Multimedia Objects. ISORC 2001: 360-365 - [c13]Stuart H. Rubin, Marion G. Ceruti:
Application of extended plausible-reasoning theory to fuel-cell design. SMC 2001: 304-309 - [c12]Marion G. Ceruti, S. I. Robinson:
Re-engineering web-based decision support systems. SMC 2001: 2081-2088 - [c11]Michael Bowman, Gheorghe Tecuci, Marion G. Ceruti:
Application of Disciple to decision making in complex and constrained environments. SMC 2001: 2932-2940 - 2000
- [c10]Bhavani M. Thuraisingham, Marion G. Ceruti:
Understanding Data Mining and applying it to Command, Control, Communications and Intelligence Environments. COMPSAC 2000: 171-175 - [c9]Stuart Harvey Rubin, Marion G. Ceruti, Lydia C. Shen:
Mining the Web for Knowledge with Sub-Optimal Mining Algorithm. COMPSAC 2000: 184-186 - [c8]Marion G. Ceruti, S. Joe McCarthy:
Establishing a Data-Mining Environment for Wartime Event Prediction with an Object-Oriented Command and Control Database. ISORC 2000: 174- - [c7]Marion G. Ceruti:
The relationship between artificial intelligence and data mining: application to future military information systems. SMC 2000: 1875 - [c6]Marion G. Ceruti, Craig Anken, Albert D. Lin, Stuart H. Rubin:
Applications of high-performance knowledge-based technology. SMC 2000: 1965-1971 - [c5]Mihaela Ulieru, Oscar Cuzzani, Stuart H. Rubin, Marion G. Ceruti:
Application of soft computing methods to the diagnosis and prediction of glaucoma. SMC 2000: 3641-3645
1990 – 1999
- 1999
- [j1]Marion G. Ceruti, Magdi N. Kamel:
Preprocessing and Integration of Data from Multiple Sources for Knowledge Discovery. Int. J. Artif. Intell. Tools 8(2): 157-177 (1999) - [c4]Marion G. Ceruti, Ray C. Trout, Tse Lee:
Effect of Complementary Processing on Navy Command and Control Software. COMPSAC 1999: 336-337 - [c3]Marion G. Ceruti, Bhavani M. Thuraisingham:
Dependable objects for databases, middleware and methodologies: a position paper. WORDS (Fall) 1999: 75-78 - [c2]Marion G. Ceruti, Ray C. Trout, Tse Lee:
Complementary processing and its impact on software performance. WORDS (Jan.) 1999: 110-116 - 1998
- [c1]Marion G. Ceruti:
Challenges in Data Management for the United States Department of Defense (DoD) Command Control, Communications, Computers, and Intelligence (C4I) Systems. COMPSAC 1998: 622-629
Coauthor Index
aka: Stuart H. Rubin
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint