Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reliability Theoretic Construct for Assessing Information Flow in Networks., , , , and . JASIS, 30 (1): 25-32 (1979)Elecitation of Knowledge from Multiple Experts Using Network Inference., and . IEEE Trans. Knowl. Data Eng., 9 (5): 688-696 (1997)Bad numbers: coping with flawed decision support., , , , and . JORS, 54 (9): 949-957 (2003)Locating Hidden Groups in Communication Networks Using Hidden Markov Models., , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 126-137. Springer, (2003)Note to reviewers., and . Comput. Math. Organ. Theory, 2 (4): 259-260 (1996)Visualizing modeling heuristics: an exploratory study., , and . ICIS, page 166-177. Association for Information Systems, (1999)Collaborative learning of ethical decision-making via simulated cases., , and . iConference, page 319-326. ACM, (2011)Communication Dynamics of Blog Networks., , , , and . SNAKDD, volume 5498 of Lecture Notes in Computer Science, page 36-54. Springer, (2008)Impact of the 2001 World Trade Center attack on critical interdependent infrastructures., , and . SMC (5), page 4053-4058. IEEE, (2004)Ethical implications of values embedded in computational models: An exploratory study., and . ASIST, volume 43 of Proc. Assoc. Inf. Sci. Technol., page 1-16. Wiley, (2006)