David Rosenthal

According to our database1, David Rosenthal authored at least 28 papers between 1984 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


When Waiting to See a Doctor Is Less Irritating: Understanding Patient Preferences and Choice Behavior in Appointment Scheduling.
Manag. Sci., 2018

Metric dimensions of minor excluded graphs and minor exclusion in groups.
Int. J. Algebra Comput., 2015

Comparison of measurement methods with a mixed effects procedure accounting for replicated evaluations (COM <sub>3</sub> PARE): method comparison algorithm implementation for head and neck IGRT positional verification.
BMC Medical Imaging, 2015

Appointment reminder systems and patient preferences: Patient technology usage and familiarity with other service providers as predictive variables.
Health Informatics J., 2013

Deduplicating Devices Considered Harmful.
ACM Queue, 2011

Higher-order theories of consciousness.
Scholarpedia, 2008

The Distribution of Student Errors Across Schools: An Initial Study.
Proceedings of the Artificial Intelligence in Education, 2007

An Assessment of Constraint-Based Tutors: A Response to Mitrovic and Ohlsson's Critique of "A Comparison of Model-Tracing and Constraint-Based Intelligent Tutoring Paradigms".
Int. J. Artif. Intell. Educ., 2006

Tools for Building Intelligent Tutoring Systems.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

A Comparison of Model-Tracing and Constraint-Based Intelligent Tutoring Paradigms.
Int. J. Artif. Intell. Educ., 2005

VersaTutor: architecture for a constraint-based intelligent tutor generator.
Proceedings of the 13th international conference on World Wide Web, 2004

Instructional Technology Software Reuse: A Case Study.
Proceedings of the 10th Americas Conference on Information Systems, 2004

A Test for Non-Disclosure in Security Level Translations.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

Continuous-Speech Structured Reporting.
Proceedings of the AMIA 1998, 1998

Rhythm Tracking Using Multiple Hypotheses.
Proceedings of the 1994 International Computer Music Conference, 1994

Machine Rhythm.
Proceedings of the 12th National Conference on Artificial Intelligence, Seattle, WA, USA, July 31, 1994

The impact of purchasing policy on electronic markets and electronic heirarchies.
Inf. Manag., 1993

The Effects of Switching Costs On The Adoption Of Electronic Markets.
Proceedings of the First Pacific Asia Conference on Information Systems, 1993

Modeling Restrictive Processes that Involve Blocking Requests.
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993

Intelligent Rhythm Tracking.
Proceedings of the 1992 International Computer Music Conference, 1992

Security Models for Priority Buffering and Interrupt Handling.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990

Implementing a Verification Methodology for McCullough Security.
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989

A Simple X11 Client Program -or- How hard can it really be to write "Hello, World"?
Proceedings of the USENIX Winter Conference. Dallas, Texas, USA, January 1988, 1988

A secure distributed operating system.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988

A Model of the Process of Listening to Simple Rhythms.
Proceedings of the 1988 International Computer Music Conference, 1988

An Approach to Increasing the Automation of the Verification of Security.
Proceedings of the First IEEE Computer Security Foundations Workshop, 1988

A proposed modification to the absolute coordinates of Logo.
ACM SIGPLAN Notices, 1984

The Order Indiscernibles of Divisible Ordered Abelian Groups.
J. Symb. Log., 1984