Author of the publication

Is the International Information Model for Patient Safety (2IMPS) a Suitable Tool to Compare Patient Safety Reporting Systems?

, , , , , , , , , , and . MedInfo, volume 192 of Studies in Health Technology and Informatics, page 1255. IOS Press, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linguistic Analysis of Large-Scale Medical Incident Reports for Patient Safety., , , , and . MIE, volume 180 of Studies in Health Technology and Informatics, page 250-254. IOS Press, (2012)Reward-Based Negotiating Agent Strategies., , , , and . AAAI, page 11569-11577. AAAI Press, (2023)On the Role of Syntactic Graph Convolutions for Identifying and Classifying Argument Components., and . AAAI, page 9997-9998. AAAI Press, (2019)Compromising Strategy Using Weighted Counting in Multi-times Negotiations., and . IIAI-AAI, page 453-458. IEEE Computer Society, (2014)A Subsequent Speaker Selection Method for Online Discussions Based on the Multi-armed Bandit Algorithm., and . PRICAI, volume 11013 of Lecture Notes in Computer Science, page 404-411. Springer, (2018)Feature Expression Extraction from Discussion Facilitators' Utterances in Web-Based Forum System towards Autonomous Facilitator Agents., , , and . IIAI-AAI, page 687-691. IEEE Computer Society, (2016)Trend Extraction Method Using Co-occurrence Patterns from Tweets., and . IIAI-AAI, page 629-632. IEEE Computer Society, (2015)Issue Clustering and Distributed Genetic Algorithms for Multi-issue Negotiations., , and . ACIS-ICIS, page 593-598. IEEE Computer Society, (2010)TKI Adaptation Strategy for Complex Multi-times Bilateral Negotiations.. SOCA, page 232-236. IEEE Computer Society, (2015)Alternating Offers Protocol Considering Fair Privacy for Multilateral Closed Negotiation., and . PRIMA, volume 10621 of Lecture Notes in Computer Science, page 533-541. Springer, (2017)