Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Data Mining to Combat Infrastructure Inefficiencies: The Case of Predicting Nonpayment for Ethiopian Telecom., , , and . AAAI Spring Symposium: Artificial Intelligence for Development, AAAI, (2010)Identifying potential adverse effects using the web: A new approach to medical hypothesis generation., , , , , , , and . Journal of Biomedical Informatics, 44 (6): 989-996 (2011)Addressing Selection Bias in Event Studies with General-Purpose Social Media Panels., , and . J. Data and Information Quality, 10 (1): 4:1-4:24 (2018)Expert Stock Picker: The Wisdom of (Experts in) Crowds., and . Int. J. Electronic Commerce, 15 (3): 73-102 (2011)Learning and Inference in Massive Social Networks., , and . MLG, (2007)Mining Road Traffic Accident Data to Improve Safety: Role of Road-Related Factors on Accident Severity in Ethiopia., and . AAAI Spring Symposium: Artificial Intelligence for Development, AAAI, (2010)TV's Dirty Little Secret: The Negative Effect of Popular TV on Online Auction Sales., , and . MIS Quarterly, 40 (3): 623-644 (2016)A system for de-identifying medical message board text., , , , , , and . BMC Bioinformatics, 12 (S-3): S2 (2011)Using Search Queries to Understand Health Information Needs in Africa., , , , and . CoRR, (2018)Social Network Signatures: A Framework for Re-identification in Networked Data and Experimental Results., and . CASoN, page 88-97. IEEE Computer Society, (2009)