Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph Analysis for Detecting Fraud, Waste, and Abuse in Healthcare Data., , , , , , , and . AI Mag., 37 (2): 33-46 (2016)Reliable Synchronization of Redundant Systems.. ISCA, page 236-237. ACM, (1978)Evaluation of strip nesting algorithms: An experimentation system for the practical users., , , , and . J. Intell. Fuzzy Syst., 27 (2): 611-623 (2014)Graph Analysis for Detecting Fraud, Waste, and Abuse in Healthcare Data., , , , , , , and . AAAI, page 3912-3919. AAAI Press, (2015)Synchronization and Matching in Redundant Systems., and . IEEE Trans. Computers, 27 (6): 531-539 (1978)Placement of microinstructions in a two-dimensional address space., , and . MICRO (2), page 46-51. ACM, (1975)Network Explorer: Design, Implementation, and Real World Deployment of a Large Network Visualization Tool., , , , , and . AVI, page 108-111. ACM, (2016)Exploiting Vector Pattern Diversity of Molecular Scaffolds for Cheminformatics Tasks in Drug Discovery., , , , , and . J. Chem. Inf. Model., 64 (6): 1966-1974 (2024)Recommendation System Rest-Mex 2022 for Mexican Tourism Using Natural Language Processing., , and . IberLEF@SEPLN, volume 3202 of CEUR Workshop Proceedings, CEUR-WS.org, (2022)ACM Membership Survey of Disability and Disability Issues., and . Commun. ACM, 35 (5): 91-93 (1992)