Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using XBRL to Conduct a Large-Scale Study of Discrepancies between the Accounting Numbers in Compustat and SEC 10-K Filings., and . J. Information Systems, 29 (1): 37-72 (2015)Logical analysis of numerical data., , , and . Math. Program., (1997)Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at Siemens., , , and . Int. J. Account. Inf. Syst., 7 (2): 137-161 (2006)Reply to the discussions of "Restoring Auditor Credibility: Tertiary Monitoring and Logging of Continuous Assurance Systems"., , and . Int. J. Account. Inf. Syst., 5 (2): 211-212 (2004)An Implementation of Logical Analysis of Data., , , , , and . IEEE Trans. Knowl. Data Eng., 12 (2): 292-306 (2000)Erratum to: Threshold Boolean form for joint probabilistic constraints with random technology matrix., , and . Math. Program., 155 (1-2): 617-620 (2016)The Northwestern University Neuroimaging Data Archive (NUNDA)., , , , and . NeuroImage, (2016)Knowing what doesn't Matter: Exploiting the Omission of Irrelevant Data., , and . Artif. Intell., 97 (1-2): 345-380 (1997)Functional Dependencies in Horn Theories., , and . Artif. Intell., 108 (1-2): 1-30 (1999)Preface., , and . Discret. Appl. Math., 156 (6): 823 (2008)