Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph Analysis for Detecting Fraud, Waste, and Abuse in Healthcare Data., , , , , , , and . AI Mag., 37 (2): 33-46 (2016)SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs., , , , , , , , and . CNS, page 1-10. IEEE, (2020)The Rules of Redaction: Identify, Protect, Review (and Repeat), , , , and . IEEE Security and Privacy, (2009)Graph Analysis for Detecting Fraud, Waste, and Abuse in Healthcare Data., , , , , , , and . AAAI, page 3912-3919. AAAI Press, (2015)Vulnerability Metrics for Graph-based Configuration Security., , , , and . SECRYPT, page 259-270. SCITEPRESS, (2021)Network Explorer: Design, Implementation, and Real World Deployment of a Large Network Visualization Tool., , , , , and . AVI, page 108-111. ACM, (2016)Automatic Digitization and Orientation of Scanned Mesh Data for Floor Plan and 3D Model Generation., , , , and . CGI, volume 14496 of Lecture Notes in Computer Science, page 53-69. Springer, (2023)MMM: a user interface architecture for shared editors on a single screen., and . UIST, page 79-86. ACM, (1991)A taxonomy of see-through tools (abstract only)., , , , and . CHI Conference Companion, page 225. ACM, (1994)A two-stage framework for designing visual analytics system in organizational environments., , , , and . IEEE VAST, page 251-260. IEEE Computer Society, (2011)