According to our database1, David Rosenthal authored at least 28 papers between 1984 and 2018.
Legend:Book In proceedings Article PhD thesis Other
When Waiting to See a Doctor Is Less Irritating: Understanding Patient Preferences and Choice Behavior in Appointment Scheduling.
Manag. Sci., 2018
Int. J. Algebra Comput., 2015
Comparison of measurement methods with a mixed effects procedure accounting for replicated evaluations (COM <sub>3</sub> PARE): method comparison algorithm implementation for head and neck IGRT positional verification.
BMC Medical Imaging, 2015
Appointment reminder systems and patient preferences: Patient technology usage and familiarity with other service providers as predictive variables.
Health Informatics J., 2013
The Distribution of Student Errors Across Schools: An Initial Study.
Proceedings of the Artificial Intelligence in Education, 2007
An Assessment of Constraint-Based Tutors: A Response to Mitrovic and Ohlsson's Critique of "A Comparison of Model-Tracing and Constraint-Based Intelligent Tutoring Paradigms".
Int. J. Artif. Intell. Educ., 2006
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
Int. J. Artif. Intell. Educ., 2005
Proceedings of the 13th international conference on World Wide Web, 2004
Proceedings of the 10th Americas Conference on Information Systems, 2004
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
Proceedings of the 1994 International Computer Music Conference, 1994
Proceedings of the 12th National Conference on Artificial Intelligence, Seattle, WA, USA, July 31, 1994
Inf. Manag., 1993
Proceedings of the First Pacific Asia Conference on Information Systems, 1993
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993
Proceedings of the 1992 International Computer Music Conference, 1992
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989
A Simple X11 Client Program -or- How hard can it really be to write "Hello, World"?
Proceedings of the USENIX Winter Conference. Dallas, Texas, USA, January 1988, 1988
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988
Proceedings of the 1988 International Computer Music Conference, 1988
An Approach to Increasing the Automation of the Verification of Security.
Proceedings of the First IEEE Computer Security Foundations Workshop, 1988
ACM SIGPLAN Notices, 1984