Author of the publication

Research Paper: Expanding the Extent of a UMLS Semantic Type via Group Neighborhood Auditing.

, , , , and . JAMIA, 16 (5): 746-757 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Late Breaking Results: Analytical Placement for 3D ICs with Multiple Manufacturing Technologies., , , , , and . DAC, page 1-2. IEEE, (2023)Understanding Consumer Search Activity and Online Purchase Intensions for Improving the Product Recommendation Search., , and . ACIS-ICIS, page 1135-1140. IEEE Computer Society, (2007)Estimating Bus Cross-Sectional Flow Based on Machine Learning Algorithm Combined with Wi-Fi Probe Technology., , and . Sensors, 21 (3): 844 (2021)First Mile in Crowdsourced Live Streaming: A Content Harvest Network Approach., , , , and . ACM Multimedia (Thematic Workshops), page 101-109. ACM, (2017)AppsPlayground: automatic security analysis of smartphone applications., , and . CODASPY, page 209-220. ACM, (2013)A Hybrid Spatio-Temporal Data Model and Structure (HST-DMS) for Efficient Storage and Retrieval of Land Use Information., and . Trans. GIS, 8 (3): 351-366 (2004)Exploring Privacy-Accuracy Tradeoffs using DPComp., , , , , and . SIGMOD Conference, page 2101-2104. ACM, (2016)Principled Evaluation of Differentially Private Algorithms using DPBench., , , , and . SIGMOD Conference, page 139-154. ACM, (2016)A tribal abstraction network for SNOMED CT target hierarchies without attribute relationships., , , , , , and . JAMIA, 22 (3): 628-639 (2015)Tomography-based overlay network monitoring., , and . Internet Measurement Conference, page 216-231. ACM, (2003)