Author of the publication

Strong control over multiple endpoints: are we adding value to the assessment of medicines?

, and . Pharmaceutical statistics, 12 (4): 189-91 (May 2013)7342<m:linebreak></m:linebreak>JID: 101201192; 2013/01/12 received; 2013/02/13 revised; 2013/04/11 accepted; aheadofprint;<m:linebreak></m:linebreak>Comparacions múltiples.
DOI: 10.1002/pst.1574

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Loop Chaining: A Programming Abstraction for Balancing Locality and Parallelism., , , , , , , , , and 1 other author(s). IPDPS Workshops, page 375-384. IEEE, (2013)Profiling and Tracing Stakeholder Needs., , and . Monterey Workshop, volume 5320 of Lecture Notes in Computer Science, page 196-213. Springer, (2007)Using pre-requirements tracing to investigate requirements based on tactic knowledge., and . ICSOFT (1), page 139-144. INSTICC Press, (2006)May/must analysis and the DFAGen data-flow analysis generator., , and . Inf. Softw. Technol., 51 (10): 1440-1453 (2009)Exposing Tacit Knowledge via Pre-Requirements Tracing., and . RE, page 346-347. IEEE Computer Society, (2006)Identifying tacit knowledge-based requirements., and . IEE Proc. Softw., 153 (6): 211-218 (2006)Local Protection Enforcement in the Path Computation Element Communication Protocol (PCEP)., , , and . RFC, (October 2023)Synthesis of array architectures for block matching motion estimation: design exploration using the tool DG2VHDL., , and . ICASSP, page 1925-1928. IEEE Computer Society, (1999)Establishing a Miniapp as a programmability proxy., , and . PPoPP, page 333-334. ACM, (2012)Automatic Determination of May/Must Set Usage in Data-Flow Analysis., , and . SCAM, page 153-162. IEEE Computer Society, (2008)