Author of the publication

The implementation of clinician designed, human-centered electronic medical record viewer in the intensive care unit: A pilot step-wedge cluster randomized trial.

, , , , , , , and . Int. J. Medical Informatics, 84 (5): 299-307 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The implementation of clinician designed, human-centered electronic medical record viewer in the intensive care unit: A pilot step-wedge cluster randomized trial., , , , , , , and . Int. J. Medical Informatics, 84 (5): 299-307 (2015)Process Improvements from Implementing an Electronic Checklist and Rounds Choreography to the Intensive Care Unit., , , , , , , and . AMIA, AMIA, (2014)Digital Signatures for Early Identification of Patients at Risk of Acute Lung Injury., , , , and . AMIA, AMIA, (2013)ProcessAWARE: Patient Outcomes and Resource Utilization Changes following Implementing an Electronic Rounding Checklist in the Intensive Care Unit., , , , , , , , and . AMIA, AMIA, (2014)Customized Reference Ranges for Laboratory Values Decrease False Positive Alerts in Intensive Care Unit Patients., , , , , , , , and . AMIA, AMIA, (2014)Comparison of H-index of panel session participants of AMIA 2011 and 2010 annual meetings., , , , and . AMIA, AMIA, (2012)An Effective Hybrid Model for Skin Cancer Detection Using Transfer Learning., , , , and . DeSE, page 840-845. IEEE, (2023)Model-Driven Engineering for Embedded Systems with Non-Functional Properties Analysis Integration: A Review., , , and . DeSE, page 822-827. IEEE, (2023)An Outcome Based Analysis on Heart Disease Prediction using Machine Learning Algorithms and Data Mining Approaches., , , and . AIIoT, page 1-7. IEEE, (2022)Detecting Routing Protocol Low Power and Lossy Network Attacks Using Machine Learning Techniques., , , , , and . SSD, page 57-62. IEEE, (2024)