Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tunably decentralized algorithms for cooperative target observation., , , and . AAMAS, page 911-917. ACM, (2005)Optimal Intruder Detection via a Multiobjective Evolutionary Algorithm.. WSC, page 15. IEEE Computer Society, (2004)Secure JAVA Applets and Applications: Guidelines and Lessons Learnt from the JAVA Security Model., , , , , , , and . AMIA, AMIA, (1999)Generating Practice Cases for Medical Training from a Knowledge-Based Decision-Support System., and . ECCBR Workshops, page 3-14. (2002)Case Based Reasoning for Medical Decision-Support in a Safety Critical Environment., , , , , and . AIME, volume 2780 of Lecture Notes in Computer Science, page 314-323. Springer, (2003)CARE-PARTNER: a computerized knowledge-support system for stem-cell post-transplant long-term follow-up on the World-Wide-Web., , , , , , , , , and . AMIA, AMIA, (1998)Distributed Reuse of Knowledge in a Computerized Decision Support System for Bone-Marrow Post-Transplant Care Over the World Wide Web., , and . AMIA, AMIA, (1997)Case-Based Reasoning in CARE-PARTNER: Gathering Evidence for Evidence-Based Medical Practice., , and . EWCBR, volume 1488 of Lecture Notes in Computer Science, page 334-345. Springer, (1998)