David Rosenthal

According to our database1, David Rosenthal authored at least 28 papers between 1984 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
When Waiting to See a Doctor Is Less Irritating: Understanding Patient Preferences and Choice Behavior in Appointment Scheduling.
Manag. Sci., 2018

2015
Metric dimensions of minor excluded graphs and minor exclusion in groups.
Int. J. Algebra Comput., 2015

Comparison of measurement methods with a mixed effects procedure accounting for replicated evaluations (COM <sub>3</sub> PARE): method comparison algorithm implementation for head and neck IGRT positional verification.
BMC Medical Imaging, 2015

2013
Appointment reminder systems and patient preferences: Patient technology usage and familiarity with other service providers as predictive variables.
Health Informatics J., 2013

2011
Deduplicating Devices Considered Harmful.
ACM Queue, 2011

2008
Higher-order theories of consciousness.
Scholarpedia, 2008

2007
The Distribution of Student Errors Across Schools: An Initial Study.
Proceedings of the Artificial Intelligence in Education, 2007

2006
An Assessment of Constraint-Based Tutors: A Response to Mitrovic and Ohlsson's Critique of "A Comparison of Model-Tracing and Constraint-Based Intelligent Tutoring Paradigms".
Int. J. Artif. Intell. Educ., 2006

Tools for Building Intelligent Tutoring Systems.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2005
A Comparison of Model-Tracing and Constraint-Based Intelligent Tutoring Paradigms.
Int. J. Artif. Intell. Educ., 2005

2004
VersaTutor: architecture for a constraint-based intelligent tutor generator.
Proceedings of the 13th international conference on World Wide Web, 2004

Instructional Technology Software Reuse: A Case Study.
Proceedings of the 10th Americas Conference on Information Systems, 2004

1999
A Test for Non-Disclosure in Security Level Translations.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

1998
Continuous-Speech Structured Reporting.
Proceedings of the AMIA 1998, 1998

1994
Rhythm Tracking Using Multiple Hypotheses.
Proceedings of the 1994 International Computer Music Conference, 1994

Machine Rhythm.
Proceedings of the 12th National Conference on Artificial Intelligence, Seattle, WA, USA, July 31, 1994

1993
The impact of purchasing policy on electronic markets and electronic heirarchies.
Inf. Manag., 1993

The Effects of Switching Costs On The Adoption Of Electronic Markets.
Proceedings of the First Pacific Asia Conference on Information Systems, 1993

Modeling Restrictive Processes that Involve Blocking Requests.
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993

1992
Intelligent Rhythm Tracking.
Proceedings of the 1992 International Computer Music Conference, 1992

1990
Security Models for Priority Buffering and Interrupt Handling.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990

1989
Implementing a Verification Methodology for McCullough Security.
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989

1988
A Simple X11 Client Program -or- How hard can it really be to write "Hello, World"?
Proceedings of the USENIX Winter Conference. Dallas, Texas, USA, January 1988, 1988

A secure distributed operating system.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988

A Model of the Process of Listening to Simple Rhythms.
Proceedings of the 1988 International Computer Music Conference, 1988

An Approach to Increasing the Automation of the Verification of Security.
Proceedings of the First IEEE Computer Security Foundations Workshop, 1988

1984
A proposed modification to the absolute coordinates of Logo.
ACM SIGPLAN Notices, 1984

The Order Indiscernibles of Divisible Ordered Abelian Groups.
J. Symb. Log., 1984


  Loading...