Fredrik Johansson

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Normalizing Large Scale Sensor-Based MWD Data: An Automated Method toward A Unified Database.
Sensors, February, 2024

2023
Arbitrary-precision computation of the gamma function.
Maple Trans., 2023

2022
Detecting computer-generated disinformation.
Int. J. Data Sci. Anal., 2022

Computing elementary functions using multi-prime argument reduction.
CoRR, 2022

2021
The minimal Fried average entropy for higher-rank Cartan actions.
Math. Comput., 2021

Rapid computation of special values of Dirichlet L-functions.
CoRR, 2021

On the Robustness and Generalizability of Face Synthesis Detection Methods.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021

Similarity ranking using handcrafted stylometric traits in a swedish context.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

2020
Calcium: computing in exact real and complex fields.
CoRR, 2020

FunGrim: a symbolic library for special functions.
CoRR, 2020

Microsimulation of Bus Terminals: A Case Study from Stockholm.
Proceedings of the Winter Simulation Conference, 2020

Understanding Association Between Logged Vehicle Data and Vehicle Marketing Parameters: Using Clustering and Rule-Based Machine Learning.
Proceedings of the IMMS 2020: 2020 3rd International Conference on Information Management and Management Science, 2020

The Applicability of Authorship Verification to Swedish Discussion Forums.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Dick-Preston and Morbo at SemEval-2019 Task 4: Transfer Learning for Hyperpartisan News Detection.
Proceedings of the 13th International Workshop on Semantic Evaluation, 2019

Ball Arithmetic as a Tool in Computer Algebra.
Proceedings of the Maple in Mathematics Education and Research - Third Maple Conference, 2019

Extracting Account Attributes for Analyzing Influence on Twitter.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

FOI Cross-Domain Authorship Attribution for Criminal Investigations.
Proceedings of the Working Notes of CLEF 2019, 2019

Supervised Classification of Twitter Accounts Based on Textual Content of Tweets.
Proceedings of the Working Notes of CLEF 2019, 2019

Faster Arbitrary-Precision Dot Product and Matrix Multiplication.
Proceedings of the 26th IEEE Symposium on Computer Arithmetic, 2019

2016
Computing hypergeometric functions rigorously.
CoRR, 2016

Multi-domain Alias Matching Using Machine Learning.
Proceedings of the Third European Network Intelligence Conference, 2016

2015
Timeprints for identifying social media users with multiple aliases.
Secur. Informatics, 2015

Evaluating Algorithms for Detection of Compromised Social Media User Accounts.
Proceedings of the 2015 Second European Network Intelligence Conference, 2015

A Semi-automatic Approach for Labeling Large Amounts of Automated and Non-automated Social Media User Accounts.
Proceedings of the 2015 Second European Network Intelligence Conference, 2015

2014
Emotion classification of social media posts for estimating people's reactions to communicated alert messages during crises.
Secur. Informatics, 2014

Local performance measures of pedestrian traffic.
Public Transp., 2014

Efficient implementation of elementary functions in the medium-precision range.
CoRR, 2014

Time Profiles for Identifying Users in Online Environments.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

2013
Constructing and Analyzing Uncertain Social Networks from Unstructured Textual Data.
Proceedings of the Mining Social Networks and Security Informatics, 2013

Harvesting and analysis of weak signals for detecting lone wolf terrorists.
Secur. Informatics, 2013

Learning to classify emotional content in crisis-related tweets.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Using Video Prototyping as a Means to Involve Crisis Communication Personnel in the Design Process: Innovating Crisis Management by Creating a Social Media Awareness Tool.
Proceedings of the Human Interface and the Management of Information. Information and Interaction for Learning, Culture, Collaboration and Business,, 2013

Detecting multiple aliases in social media.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Efficient implementation of the Hardy-Ramanujan-Rademacher formula.
LMS J. Comput. Math., 2012

Assessing Relative Bioactivity of Chemical Substances Using Quantitative Molecular Network Topology Analysis.
J. Chem. Inf. Model., 2012

Estimating Citizen Alertness in Crises Using Social Media Monitoring and Analysis.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Analysis of Weak Signals for Detecting Lone Wolf Terrorists.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Real-time Allocation of Firing Units To Hostile Targets.
J. Adv. Inf. Fusion, 2011

A fast algorithm for reversion of power series
CoRR, 2011

A social network analysis of the information fusion community.
Proceedings of the 14th International Conference on Information Fusion, 2011

Detecting Emergent Conflicts through Web Mining and Visualization.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2010
Evaluating the performance of TEWA systems.
PhD thesis, 2010

Relative von Neumann Entropy for Evaluating amino acid conservation.
J. Bioinform. Comput. Biol., 2010

A comparative study of conservation and variation scores.
BMC Bioinform., 2010

A Suite of Metaheuristic Algorithms for Static Weapon-Target Allocation.
Proceedings of the 2010 International Conference on Genetic and Evolutionary Methods, 2010

SWARD: System for weapon allocation research & development.
Proceedings of the 13th Conference on Information Fusion, 2010

Real-time allocation of defensive resources to rockets, artillery, and mortars.
Proceedings of the 13th Conference on Information Fusion, 2010

2009
Performance Evaluation of TEWA Systems for Improved Decision Support.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2009

2008
The Influence of Porous Silicon on Axonal Outgrowth <i>in Vitro</i>.
IEEE Trans. Biomed. Eng., 2008

Supporting Maritime Situation Awareness Using Self Organizing Maps and Gaussian Mixture Models.
Proceedings of the Tenth Scandinavian Conference on Artificial Intelligence, 2008

A Comparison between Two Approaches to Threat Evaluation in an Air Defense Scenario.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2008

Extending the scope of situation analysis.
Proceedings of the 11th International Conference on Information Fusion, 2008

A Bayesian network approach to threat evaluation with application to an air defense scenario.
Proceedings of the 11th International Conference on Information Fusion, 2008

2007
A Unified Situation Analysis Model for Human and Machine Situation Awareness.
Proceedings of the 37. Jahrestagung der Gesellschaft für Informatik, 2007

2006
Implementation and integration of a Bayesian Network for prediction of tactical intention into a ground target simulator.
Proceedings of the 9th International Conference on Information Fusion, 2006

2004
Mobile IPv4 Extension for Carrying Network Access Identifiers.
RFC, June, 2004


  Loading...