Fredrik Johansson

According to our database1, Fredrik Johansson
  • authored at least 47 papers between 2004 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Numerical integration in arbitrary-precision ball arithmetic.
CoRR, 2018

2017
Arb: Efficient Arbitrary-Precision Midpoint-Radius Interval Arithmetic.
IEEE Trans. Computers, 2017

SymPy: symbolic computing in Python.
PeerJ Computer Science, 2017

Computing the Lambert W function in arbitrary-precision complex interval arithmetic.
CoRR, 2017

Nemo/Hecke: Computer Algebra and Number Theory Packages for the Julia Programming Language.
CoRR, 2017

Nemo/Hecke: Computer Algebra and Number Theory Packages for the Julia Programming Language.
Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, 2017

2016
SymPy: Symbolic computing in Python.
PeerJ PrePrints, 2016

Arb: Efficient Arbitrary-Precision Midpoint-Radius Interval Arithmetic.
CoRR, 2016

Computing hypergeometric functions rigorously.
CoRR, 2016

Multi-domain Alias Matching Using Machine Learning.
Proceedings of the Third European Network Intelligence Conference, 2016

2015
Timeprints for identifying social media users with multiple aliases.
Security Informatics, 2015

Evaluating Algorithms for Detection of Compromised Social Media User Accounts.
Proceedings of the 2015 Second European Network Intelligence Conference, 2015

A Semi-automatic Approach for Labeling Large Amounts of Automated and Non-automated Social Media User Accounts.
Proceedings of the 2015 Second European Network Intelligence Conference, 2015

2014
Emotion classification of social media posts for estimating people's reactions to communicated alert messages during crises.
Security Informatics, 2014

Local performance measures of pedestrian traffic.
Public Transport, 2014

Efficient implementation of elementary functions in the medium-precision range.
CoRR, 2014

Time Profiles for Identifying Users in Online Environments.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

2013
Constructing and Analyzing Uncertain Social Networks from Unstructured Textual Data.
Proceedings of the Mining Social Networks and Security Informatics, 2013

Harvesting and analysis of weak signals for detecting lone wolf terrorists.
Security Informatics, 2013

Evaluating parametric holonomic sequences using rectangular splitting.
CoRR, 2013

Rigorous high-precision computation of the Hurwitz zeta function and its derivatives.
CoRR, 2013

Arb: a C library for ball arithmetic.
ACM Comm. Computer Algebra, 2013

Learning to classify emotional content in crisis-related tweets.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Using Video Prototyping as a Means to Involve Crisis Communication Personnel in the Design Process: Innovating Crisis Management by Creating a Social Media Awareness Tool.
Proceedings of the Human Interface and the Management of Information. Information and Interaction for Learning, Culture, Collaboration and Business,, 2013

Detecting multiple aliases in social media.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Assessing Relative Bioactivity of Chemical Substances Using Quantitative Molecular Network Topology Analysis.
Journal of Chemical Information and Modeling, 2012

Estimating Citizen Alertness in Crises Using Social Media Monitoring and Analysis.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Analysis of Weak Signals for Detecting Lone Wolf Terrorists.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Real-time Allocation of Firing Units To Hostile Targets.
J. Adv. Inf. Fusion, 2011

A fast algorithm for reversion of power series
CoRR, 2011

A social network analysis of the information fusion community.
Proceedings of the 14th International Conference on Information Fusion, 2011

Detecting Emergent Conflicts through Web Mining and Visualization.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2010
Relative von Neumann Entropy for Evaluating amino acid conservation.
J. Bioinformatics and Computational Biology, 2010

A comparative study of conservation and variation scores.
BMC Bioinformatics, 2010

A Suite of Metaheuristic Algorithms for Static Weapon-Target Allocation.
Proceedings of the 2010 International Conference on Genetic and Evolutionary Methods, 2010

SWARD: System for weapon allocation research & development.
Proceedings of the 13th Conference on Information Fusion, 2010

Real-time allocation of defensive resources to rockets, artillery, and mortars.
Proceedings of the 13th Conference on Information Fusion, 2010

2009
Performance Evaluation of TEWA Systems for Improved Decision Support.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2009

2008
The Influence of Porous Silicon on Axonal Outgrowth in Vitro.
IEEE Trans. Biomed. Engineering, 2008

Supporting Maritime Situation Awareness Using Self Organizing Maps and Gaussian Mixture Models.
Proceedings of the Tenth Scandinavian Conference on Artificial Intelligence, 2008

A Comparison between Two Approaches to Threat Evaluation in an Air Defense Scenario.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2008

Extending the scope of situation analysis.
Proceedings of the 11th International Conference on Information Fusion, 2008

A Bayesian network approach to threat evaluation with application to an air defense scenario.
Proceedings of the 11th International Conference on Information Fusion, 2008

2007
A Unified Situation Analysis Model for Human and Machine Situation Awareness.
Proceedings of the INFORMATIK 2007: Informatik trifft Logistik. Band 2. Beiträge der 37. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 2007

2006
Implementation and integration of a Bayesian Network for prediction of tactical intention into a ground target simulator.
Proceedings of the 9th International Conference on Information Fusion, 2006

2004
Mobile IPv4 Extension for Carrying Network Access Identifiers.
RFC, June, 2004


  Loading...