From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection of anomalous insiders in collaborative environments via relational analysis of access logs., и . CODASPY, стр. 63-74. ACM, (2011)XGBoost Imputation for Time Series Data., , , , и . ICHI, стр. 1-3. IEEE, (2019)COAT: COnstraint-based Anonymization of Transactions, , и . CoRR, (2009)A multi-institution evaluation of clinical profile anonymization., , , , , , и . JAMIA, 23 (e1): e131-e137 (2016)Predicting changes in hypertension control using electronic health records from a chronic disease management program., , , , , , , , , и . J. Am. Medical Informatics Assoc., 21 (2): 337-344 (2014)Development of an automated phenotyping algorithm for hepatorenal syndrome., , , , , , , и . J. Biomed. Informatics, (2018)EBAM: Experience-Based Access Management for Healthcare., , и . HealthSec, USENIX Association, (2010)A Game-Theoretic Approach for Alert Prioritization., , , , и . AAAI Workshops, том WS-17 из AAAI Technical Report, AAAI Press, (2017)A Semantic Cover Approach for Topic Modeling., , , и . *SEM@NAACL-HLT, стр. 92-102. Association for Computational Linguistics, (2019)Composition and Disclosure of Unlinkable Distributed Databases., и . ICDE, стр. 118. IEEE Computer Society, (2006)