Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A spreading activation theory of semantic memory, and . Psychological Review, (1975)Resonant Control of Elastic Collisions in an Optically Trapped Fermi Gas of Atoms, , , , and . Phys. Rev. Lett., 88 (17): 173201 (April 2002)The death of personal computing at the University of Scranton., and . SIGUCCS, page 239-242. ACM, (1991)epimargin: A Toolkit for Epidemiological Estimation, Prediction, and Policy Evaluation., , , , and . J. Open Source Softw., 6 (65): 3464 (2021)Agent modeling: reducing training costs through integration of simulations, C4I systems, and expert systems., , , and . WSC, page 940-947. WSC, (2002)Interactive Advertising: Patterns of Use and Effectiveness., , , , , , , and . CHI, page 219-224. ACM, (1998)Prescription of amiodarone through a Computerized Template that includes both Decision Support and Executive Functions Improves the Monitoring for Toxicities., , and . AMIA, AMIA, (2003)A Spreading Activiation Theory on Semantic Processing, and . Psychological Review, (1975)Chief information officer (CIO) panel: how to groom IT leadership as change agents., , , and . CPR, page 1-2. ACM, (2012)Secure Outsourced Computation., and . AFRICACRYPT, volume 6737 of Lecture Notes in Computer Science, page 1-20. Springer, (2011)