Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic evaluation of the hosting capacity in distribution networks., , , , , , and . ISGT Europe, page 1-6. IEEE, (2016)Crossing the health IT chasm: considerations and policy recommendations to overcome current challenges and enable value-based care., , , , and . J. Am. Medical Informatics Assoc., 24 (5): 1036-1043 (2017)Lariat: A Visual Analytics Tool for Social Media Researchers to Explore Twitter Datasets., , , , , , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)The effective use of undergraduates to staff large introductory CS courses., , and . SIGCSE, page 22-25. ACM, (1988)Manipulation Data Collection and Annotation Tool for Media Forensics., , , , , , , , , and . CVPR Workshops, page 29-37. Computer Vision Foundation / IEEE, (2019)Municipal broadband wireless networks., , , , , and . Commun. ACM, 51 (2): 72-80 (2008)CLog: Low Cost Gigabit Full Packet Logging., , , , , and . J. Commun., 1 (7): 17-23 (2006)Distribution feeder hosting capacity analysis., , and . ISGT Europe, page 1-6. IEEE, (2017)Detection of Inconsistencies in SysML/OCL Models Using OWL Reasoning., , , , and . SN Comput. Sci., 4 (2): 175 (March 2023)Privacy Policies and Practices: Inside the Organizational Maze.. Commun. ACM, 36 (12): 104-122 (1993)