Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NADIR: An automated system for detecting network intrusion and misuse., , , , , and . Comput. Secur., 12 (3): 235-248 (1993)Assessment of the Impact of Cosmic-Ray-Induced Neutrons on Hardware in the Roadrunner Supercomputer, , , , , , , , and . IEEE Transactions on Device and Materials Reliability, 12 (2): 445--454 (May 2012)Efficient Remediation of Terms Inactivated by Dictionary Updates., , , and . AMIA, AMIA, (2017)Correctness Field Testing of Production and Decommissioned High Performance Computing Platforms at Los Alamos National Laboratory., , , , and . SC, page 609-619. IEEE Computer Society, (2014)A Continuum of Sociotechnical Requirements for Patient-Centered Problem Lists., , , , , and . MedInfo, volume 192 of Studies in Health Technology and Informatics, page 889-893. IOS Press, (2013)Correctness Field Testing of Production and Decommissioned High Performance Computing Platforms at Los Alamos National Laboratory., , , , and . SC, page 609-619. IEEE Computer Society, (2014)Wide-Area Gigabit Networking: Los Alamos HIPPI-SONET Gateway., and . SC, page 46. ACM, (1995)Modeling Decision Support Rule Interactions in a Clinical Setting., , , , , , , , , and . MedInfo, volume 192 of Studies in Health Technology and Informatics, page 908-912. IOS Press, (2013)Towards the Effective Management of EHR Configuration Integrity., , , , , and . AMIA, AMIA, (2017)