Author of the publication

3rd Annual Workshop on Interoperability and Smart Interactions in Healthcare (ISIH).

, , , , and . CASCON, page 351-352. IBM / ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

3rd Annual Workshop on Interoperability and Smart Interactions in Healthcare (ISIH)., , , , and . CASCON, page 351-352. IBM / ACM, (2011)A language based model for analysis of communication intensive processes in health care., , , and . SEHS@ICSE, page 15-18. ACM, (2016)Uncovering Variability Models for Software Ecosystems from Multi-Repository Structures., , and . VaMoS, page 103. ACM, (2015)Applying Information System Hazard Analysis to an Episodic Document Context., , , and . FHIES/SEHC, volume 9062 of Lecture Notes in Computer Science, page 194-213. Springer, (2014)Conditions potentially sensitive to a Personal Health Record (PHR) intervention, a systematic review., , , , , and . BMC Med. Inf. & Decision Making, (2015)Mining clinical text for stroke prediction., , , , and . NetMAHIB, 4 (1): 16 (2015)An RCT Simulation Study on Performance and Accuracy of Inexact Matching Algorithms for Patient Identity in Ambulatory Care Settings., , , , and . ICHI, page 8-17. IEEE Computer Society, (2015)Understanding database schema evolution: A case study., , , , and . Sci. Comput. Program., (2015)Taming the Data Quality Dragon - A Theory and Method for Data Quality by Design., , and . MedInfo, volume 216 of Studies in Health Technology and Informatics, page 928. IOS Press, (2015)Circle of Health Based Access Control for Personal Health Information Systems., , and . GraMSec@CSF, volume 10744 of Lecture Notes in Computer Science, page 107-114. Springer, (2017)