Author of the publication

Team is brain: leveraging EHR audit log data for new insights into acute care processes.

, , , , , , , , , and . J. Am. Medical Informatics Assoc., 30 (1): 8-15 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chinese Word Spelling Correction Based on Rule Induction., , , , and . CIPS-SIGHAN, page 139-145. Association for Computational Linguistics, (2014)Behavior recognition based on track space-time characteristics., and . J. Intell. Fuzzy Syst., 39 (6): 8675-8684 (2020)An improved particle swarm optimization algorithm in selection of e-commerce distribution center., and . J. Intell. Fuzzy Syst., 39 (6): 8783-8793 (2020)Simple strategies that generate bounded solutions for the multiple-choice multi-dimensional knapsack problem: a guide for OR practitioners., , , and . Int. Trans. Oper. Res., 30 (6): 4061-4077 (November 2023)Team is brain: leveraging EHR audit log data for new insights into acute care processes., , , , , , , , , and . J. Am. Medical Informatics Assoc., 30 (1): 8-15 (2022)What is the best greedy-like heuristic for the weighted set covering problem?, , and . Oper. Res. Lett., 44 (3): 366-369 (2016)SksOpen: Efficient Indexing, Querying, and Visualization of Geo-spatial Big Data., , , , , and . ICMLA (2), page 495-500. IEEE, (2013)978-0-7695-5144-9.Inverted Pendulum System Control by Using Modified Iterative Learning Control., , , and . ICIRA, volume 5928 of Lecture Notes in Computer Science, page 1230-1236. Springer, (2009)Reducts of the Random Bipartite Graph.. Notre Dame J. Formal Log., 54 (1): 33-46 (2013)A Rational Protocol Treatment of 51% Attacks., , and . CRYPTO (3), volume 12827 of Lecture Notes in Computer Science, page 3-32. Springer, (2021)