Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Bioterrorism Threat and Dual-use Biotechnological Research: An Israeli Perspective., , , and . Sci. Eng. Ethics, 16 (1): 85-97 (2010)Visual analytical tool for evaluation of 10-year perioperative transfusion practice at a children's hospital., , , , , , , , , and 1 other author(s). J. Am. Medical Informatics Assoc., 21 (3): 529-534 (2014)Why Every Business Will be like Show Business. Inc. Magazine, (1995)Why Not Hang Them All: The Virtues of Inefficient Punishment. Journal of Political Economy, 107 (s6): S259--S269 (335 12 1999)doi: 10.1086/250110.Book Review Reforming Products Liability. W. Kip Viscusi. Journal of Political Economy, 101 (3): 554 (Jan 1, 1993)doi: 10.1086/261887.Der ökonomische Code. Wie wirtschaftliches Denken unser Handeln bestimmt. (1999)Broca, an integrated parser for spoken language., , and . ICSLP, page 325-328. ISCA, (1992)Safe Recursive Set Functions., , and . J. Symb. Log., 80 (3): 730-762 (2015)Artifact-Tolerant Clustering-Guided Contrastive Embedding Learning for Ophthalmic Images., , , , , , , , , and 3 other author(s). CoRR, (2022)On the dimensionality of steady-state vowel normalization.. ICASSP, page 2627-2630. IEEE, (1986)