Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaborative learning of ethical decision-making via simulated cases., , and . iConference, page 319-326. ACM, (2011)Bad numbers: coping with flawed decision support., , , , and . JORS, 54 (9): 949-957 (2003)Visualizing modeling heuristics: an exploratory study., , and . ICIS, page 166-177. Association for Information Systems, (1999)Locating Hidden Groups in Communication Networks Using Hidden Markov Models., , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 126-137. Springer, (2003)A Reliability Theoretic Construct for Assessing Information Flow in Networks., , , , and . JASIS, 30 (1): 25-32 (1979)Note to reviewers., and . Comput. Math. Organ. Theory, 2 (4): 259-260 (1996)Communication Dynamics of Blog Networks., , , , and . SNAKDD, volume 5498 of Lecture Notes in Computer Science, page 36-54. Springer, (2008)Impact of the 2001 World Trade Center attack on critical interdependent infrastructures., , and . SMC (5), page 4053-4058. IEEE, (2004)Elecitation of Knowledge from Multiple Experts Using Network Inference., and . IEEE Trans. Knowl. Data Eng., 9 (5): 688-696 (1997)Ethical implications of values embedded in computational models: An exploratory study., and . ASIST, volume 43 of Proc. Assoc. Inf. Sci. Technol., page 1-16. Wiley, (2006)