Author of the publication

Harmonization of methods to facilitate reproducibility in medical data processing: Applications to diffusion tensor magnetic resonance imaging.

, , , , and . BigData, page 3992-3994. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capturing significant events with neural networks., , , , and . Neural Networks, (2012)DR-TAMAS: Diffeomorphic Registration for Tensor Accurate Alignment of Anatomical Structures., , , , , , and . NeuroImage, (2016)Population based MRI and DTI templates of the adult ferret brain and tools for voxelwise analysis., , , , , , , , and . NeuroImage, (2017)How Secure is Your System? Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior., and . AMCIS, page 236. Association for Information Systems, (2010)Harmonization of methods to facilitate reproducibility in medical data processing: Applications to diffusion tensor magnetic resonance imaging., , , , and . BigData, page 3992-3994. IEEE Computer Society, (2016)Knowledge Sourcing and Knowledge Consumption in Computer-Mediated Complex Decision Making., , , and . HICSS, page 1-8. IEEE Computer Society, (2011)When Training Gets Trumped: How dual-Task interference inhibits Security Training., , , and . ECIS, page Research Paper 163. (2016)From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It., , , , and . J. of Management Information Systems, 33 (3): 713-743 (2016)Noise Synthesis Technique in Time Domain for Metrology Application., and . IEEE Trans. Instrumentation and Measurement, 68 (6): 2288-2294 (2019)Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals., , , and . IT for Development, 20 (2): 196-213 (2014)