Author of the publication

A Simulation Modelling Study of Referral Distribution Policies in a Centralized Intake System for Surgical Consultation.

, , , , , , , , and . J. Medical Syst., 47 (1): 4 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Elevator Dispatching Using Heuristic Search., , and . Intell. Autom. Soft Comput., 16 (1): 77-87 (2010)Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders., and . ICISS, volume 5905 of Lecture Notes in Computer Science, page 208-221. Springer, (2009)Design solutions for the Bulldozer 32nm SOI 2-core processor module in an 8-core CPU., , , , , , , , , and 4 other author(s). ISSCC, page 78-80. IEEE, (2011)Steamroller Module and Adaptive Clocking System in 28 nm CMOS., , , , , , , , , and 5 other author(s). IEEE J. Solid State Circuits, 50 (1): 24-34 (2015)Insider threat discovery using automatic detection of mission critical data based on content., and . IAS, page 56-61. IEEE, (2010)OGMA: Visualisation for Software Container Security Analysis and Automated Remediation., , and . CSR, page 76-81. IEEE, (2022)Unsupervised One-Class Learning for Anomaly Detection on Home IoT Network Devices., and . CyberSA, page 1-8. IEEE, (2021)4.8 A 28nm x86 APU optimized for power and area efficiency., , , , , , , , , and 2 other author(s). ISSCC, page 1-3. IEEE, (2015)"Zen 4": The AMD 5nm 5.7GHz x86-64 Microprocessor Core., , , , , , , , , and 10 other author(s). ISSCC, page 38-39. IEEE, (2023)Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation., , , , and . WOSIS, page 93-102. INSTICC Press, (2009)