From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Graph Analysis for Detecting Fraud, Waste, and Abuse in Healthcare Data., , , , , , , и . AI Mag., 37 (2): 33-46 (2016)SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs., , , , , , , , и . CNS, стр. 1-10. IEEE, (2020)The Rules of Redaction: Identify, Protect, Review (and Repeat), , , , и . IEEE Security and Privacy, (2009)Graph Analysis for Detecting Fraud, Waste, and Abuse in Healthcare Data., , , , , , , и . AAAI, стр. 3912-3919. AAAI Press, (2015)Vulnerability Metrics for Graph-based Configuration Security., , , , и . SECRYPT, стр. 259-270. SCITEPRESS, (2021)Network Explorer: Design, Implementation, and Real World Deployment of a Large Network Visualization Tool., , , , , и . AVI, стр. 108-111. ACM, (2016)Automatic Digitization and Orientation of Scanned Mesh Data for Floor Plan and 3D Model Generation., , , , и . CGI, том 14496 из Lecture Notes in Computer Science, стр. 53-69. Springer, (2023)MMM: a user interface architecture for shared editors on a single screen., и . UIST, стр. 79-86. ACM, (1991)A taxonomy of see-through tools (abstract only)., , , , и . CHI Conference Companion, стр. 225. ACM, (1994)A two-stage framework for designing visual analytics system in organizational environments., , , , и . IEEE VAST, стр. 251-260. IEEE Computer Society, (2011)