Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of a Profile Similarity Methodology for Identifying Terrorist Groups That Use or Pursue CBRN Weapons., , , , , , and . SBP, volume 6589 of Lecture Notes in Computer Science, page 26-33. Springer, (2011)Institutional Logics from the Aggregation of Organizational Networks: Operational Procedures for the Analysis of Counted Data., and . Comput. Math. Organ. Theory, 10 (1): 17-43 (2004)Transformation of social networks in the late pre-Hispanic US Southwest, , , , , , , , , and 1 other author(s). Proceedings of the National Academy of Sciences, (Mar 25, 2013)Toward a computational hermeneutics., , and . Big Data Soc., 2 (2): 205395171561380 (December 2015)Social Structure form Multiple Networks. I. Blockmodels of Roles and Positions, , and . The American Journal of Sociology, 81 (4): 730--780 (1976)Using Organizational Similarity to Identify Statistical Interactions for Improving Situational Awareness of CBRN Activities., , , , and . SBP, volume 7227 of Lecture Notes in Computer Science, page 61-68. Springer, (2012)Multimodal Graph Analysis of Cyber Attacks., , , and . SpringSim, page 1-12. IEEE, (2019)Social structure from multiple networks: Blockmodells of roles and positions, , and . AJS, (1976)Lattices and dimensional representations: matrix decompositions and ordering structures., and . Soc. Networks, 24 (4): 423-444 (2002)Scaling down.. Big Data Soc., 2 (2): 205395171560249 (December 2015)