Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Viewpoint Article: Conducting and Presenting Empirical Software Engineering.. Empirical Software Engineering, 6 (3): 195-200 (2001)Towards Operational Measures of Computer Security., , , , , , , , and . Journal of Computer Security, 2 (2-3): 211-230 (1993)Moving from Philosophy to Practice in Software Measurement., , , , and . Formal Aspects of Measurement, page 38-59. Springer, (1991)Software metrics - a rigorous approach.. Chapman and Hall, (1991)When and where to transfer for Bayesian network parameter learning., , and . Expert Syst. Appl., (2016)An improved method for solving Hybrid Influence Diagrams., , , , and . Int. J. Approx. Reasoning, (2018)Value of information analysis for interventional and counterfactual Bayesian networks in forensic medical sciences., , , , and . Artificial Intelligence in Medicine, (2016)Profiting from an inefficient association football gambling market: Prediction, risk and uncertainty using Bayesian networks., , and . Knowl.-Based Syst., (2013)Not just data: A method for improving prediction with knowledge., , , , and . Journal of Biomedical Informatics, (2014)Comparing risks of alternative medical diagnosis using Bayesian arguments., and . Journal of Biomedical Informatics, 43 (4): 485-495 (2010)