Author of the publication

Application of Machine Learning Techniques to Examine Social Service Needs Among Hispanic Family Caregivers of Persons with Dementia.

, , , , , , , , , , and . ICIMTH, volume 295 of Studies in Health Technology and Informatics, page 507-510. IOS Press, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Open and Interactive Learning Resources for Algorithmic Problem Solving., and . FM Workshops (2), volume 12233 of Lecture Notes in Computer Science, page 200-208. Springer, (2019)Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption., , , and . ESORICS Workshops (1), volume 14398 of Lecture Notes in Computer Science, page 199-215. Springer, (2023)DifFuzzAR: automatic repair of timing side-channel vulnerabilities via refactoring., , , and . Autom. Softw. Eng., 31 (1): 1 (June 2024)Exploring Automatic Specification Repair in Dafny Programs., , and . ASEW, page 105-112. IEEE, (2023)Polyglot Code Smell Detection for Infrastructure as Code with GLITCH., , , , and . ASE, page 2042-2045. IEEE, (2023)Evaluating the Accuracy of Password Strength Meters using Off-The-Shelf Guessing Attacks., , and . ISSRE Workshops, page 237-242. IEEE, (2020)Leveraging Large Language Models to Boost Dafny's Developers Productivity., , and . FormaliSE@ICSE, page 138-142. ACM, (2024)Extending EcoAndroid with Automated Detection of Resource Leaks., , , and . MOBILESoft, page 17-27. IEEE, (2022)Verified Password Generation from Password Composition Policies., , , , and . IFM, volume 13274 of Lecture Notes in Computer Science, page 271-288. Springer, (2022)Automatic Repair of Java Code with Timing Side-Channel Vulnerabilities., , and . ASE Workshops, page 1-8. IEEE, (2021)