Author of the publication

Lattices and dimensional representations: matrix decompositions and ordering structures.

, and . Soc. Networks, 24 (4): 423-444 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of a Profile Similarity Methodology for Identifying Terrorist Groups That Use or Pursue CBRN Weapons., , , , , , and . SBP, volume 6589 of Lecture Notes in Computer Science, page 26-33. Springer, (2011)Institutional Logics from the Aggregation of Organizational Networks: Operational Procedures for the Analysis of Counted Data., and . Comput. Math. Organ. Theory, 10 (1): 17-43 (2004)Transformation of social networks in the late pre-Hispanic US Southwest, , , , , , , , , and 1 other author(s). Proceedings of the National Academy of Sciences, (Mar 25, 2013)Using Organizational Similarity to Identify Statistical Interactions for Improving Situational Awareness of CBRN Activities., , , , and . SBP, volume 7227 of Lecture Notes in Computer Science, page 61-68. Springer, (2012)Toward a computational hermeneutics., , and . Big Data Soc., 2 (2): 205395171561380 (December 2015)Social Structure form Multiple Networks. I. Blockmodels of Roles and Positions, , and . The American Journal of Sociology, 81 (4): 730--780 (1976)Social structure from multiple networks: Blockmodells of roles and positions, , and . AJS, (1976)Scaling down.. Big Data Soc., 2 (2): 205395171560249 (December 2015)Comparative configurational analysis as a two-mode network problem: A study of terrorist group engagement in the drug trade., , , , and . Soc. Networks, (2014)Multimodal Graph Analysis of Cyber Attacks., , , and . SpringSim, page 1-12. IEEE, (2019)