Author of the publication

Identifying Effective Approaches for Dissemination of Clinical Evidence - Correlation Analyses on Promotional Activities and Usage of a Guideline-Driven Interactive Case Simulation Tool in a Statewide HIV-HCV-STD Clinical Education Program.

, , and . MedInfo, volume 216 of Studies in Health Technology and Informatics, page 515-519. IOS Press, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public key cryptography-based security scheme for wireless sensor networks in healthcare., , , and . ICUIMC, page 5. ACM, (2010)Indexation des émotions dans les documents audiovisuels à partir de la modalité auditive. (Indexing emotions in audiovisual documents using the auditory modality).. Hanoi University of Science and Technology, Vietnam, (2009)An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks., , , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 735-736. Springer, (2006)A Trust-Based Security Architecture for Ubiquitous Computing Systems., , , , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 753-754. Springer, (2006)Performance Evaluation of Quick-Start in Low Latency Networks., , , , and . CCNC, page 1-3. IEEE, (2010)Assessing the Usage of a Guideline-Driven Interactive Case Simulation Tool for Insomnia Screening and Treatment in an HIV Clinical Education Program., , and . MedInfo, volume 192 of Studies in Health Technology and Informatics, page 323-327. IOS Press, (2013)Correlations between Promotional Activities and Usage of a Guideline-Driven Interactive Case Simulation Tool., , and . AMIA, AMIA, (2013)Secured WSN-integrated cloud computing for u-Life Care., , , , , , , , , and 2 other author(s). CCNC, page 1-2. IEEE, (2010)Embedded Processor Security., , , , , , , , , and 6 other author(s). Security and Management, page 591-. CSREA Press, (2007)A Key-Exchanging Scheme for Distributed Sensor Networks., , and . INTELLCOMM, volume 190 of IFIP, page 271-279. Springer, (2005)