default search action
Donald J. Berndt
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Saurav Chakraborty, Sandeep Goyal, Annamina Rieder, Agnieszka Onuchowska, Donald J. Berndt:
Freedom of speech or freedom of reach? Strategies for mitigating malicious content in social networks. Decis. Support Syst. 182: 114235 (2024) - 2023
- [j21]Varol O. Kayhan, Donald J. Berndt:
Navigating Workload Compatibility Between a Recommender System and a NoSQL Database: An Interactive Tutorial. Commun. Assoc. Inf. Syst. 53: 30 (2023)
2010 – 2019
- 2019
- [c46]Agnieszka Onuchowska, Donald J. Berndt:
Towards Understanding Malicious Actions on Twitter. AMCIS 2019 - [c45]Agnieszka Onuchowska, Donald J. Berndt, Sagar Samtani:
Rocket ship or Blimp? - Implications of Malicious Accounts removal on Twitter. ECIS 2019 - [c44]Agnieszka Onuchowska, Donald J. Berndt:
Using Agent-Based Modelling to Address Malicious Behavior on Social Media. ICIS 2019 - [c43]Donald J. Berndt, David Boogers, Saurav Chakraborty, Carles Cabre:
Using agent-based modeling to assess the implications of changing liquidity conditions. SummerSim 2019: 29:1-29:12 - 2018
- [c42]Thomas Stablein, Donald J. Berndt, Matthew Mullarkey:
Technical debt-related information asymmetry between finance and IT. TechDebt@ICSE 2018: 134-137 - 2017
- [j20]Donald J. Berndt, Ricardo Lasa, James A. McCart:
SiteWit Corporation: SQL or NoSQL? That is the Question! J. Inf. Technol. Educ. Discuss. Cases 6: 4 (2017) - [j19]Donald J. Berndt, David Boogers, Saurav Chakraborty, James A. McCart:
Using Agent-Based Modeling to Assess Liquidity Mismatch in Open-End Bond Funds. Syst. 5(4): 54 (2017) - [c41]Donald J. Berndt, David Boogers, Saurav Chakraborty, Ratish Dalvi:
Data Visualization and Sonification for Financial Agent-Based Models. AMCIS 2017 - [c40]Saurav Chakraborty, Jordan Gaeta, Kaushik Dutta, Donald J. Berndt:
An Analysis of Stability of Inter-bank Loan Network: A Simulated Network Approach. HICSS 2017: 1-10 - [c39]Donald J. Berndt, David Boogers, Saurav Chakraborty, James A. McCart:
Using agent-based modeling to assess liquidity mismatch in open-end bond funds. SummerSim 2017: 30:1-30:12 - 2016
- [c38]Donald J. Berndt, David Boogers, James A. McCart:
Agent-Based Models of the Corporate Bond Market. DSMM@SIGMOD 2016: 6:1-6:6 - 2015
- [j18]Donald J. Berndt, James A. McCart, Dezon K. Finch, Stephen L. Luther:
A Case Study of Data Quality in Text Mining Clinical Progress Notes. ACM Trans. Manag. Inf. Syst. 6(1): 1:1-1:21 (2015) - 2013
- [j17]James A. McCart, Balaji Padmanabhan, Donald J. Berndt:
Goal attainment on long tail web sites: An information foraging approach. Decis. Support Syst. 55(1): 235-246 (2013) - [j16]James A. McCart, Donald J. Berndt, Jay Jarman, Dezon Finch, Stephen Luther:
Finding falls in ambulatory care clinical documents using statistical text mining. J. Am. Medical Informatics Assoc. 20(5): 906-914 (2013) - [c37]James A. McCart, Donald J. Berndt, Philip Foulis, Richard Martinello, Stephen Luther:
Evaluating Information Retrieval Approaches on Heterogeneous Clinical Notes. AMIA 2013 - 2012
- [j15]Monica Chiarini Tremblay, Alan R. Hevner, Donald J. Berndt:
Design of an information volatility measure for health care decision making. Decis. Support Syst. 52(2): 331-341 (2012) - [c36]Dezon Finch, Donald J. Berndt:
Extracting Semi-Structured Text Elements in Medical Progress Notes: A Machine Learning Approach. AMIA 2012 - [c35]Jay Jarman, James A. McCart, Stephen Luther, Donald J. Berndt:
Automated Rule Development Using Text Mining. AMIA 2012 - [c34]James A. McCart, Donald J. Berndt, Dezon Finch, Jay Jarman, Stephen Luther:
Using Statistical Text Mining to Identify Falls in VHA Ambulatory Care Data. AMIA 2012 - [c33]Donald J. Berndt, Ricardo Lasa, James A. McCart:
SiteWit Corporation: SQL or NoSQL that is the Question. ICIS 2012 - 2011
- [j14]Stephen Luther, Donald J. Berndt, Dezon Finch, Matthew Richardson, Edward Hickling, David Hickam:
Using statistical text mining to supplement the development of an ontology. J. Biomed. Informatics 44(Supplement-1): S86-S93 (2011) - 2010
- [b1]Rana Farid Mikhail, Donald J. Berndt, Abraham Kandel:
Automated Database Applications Testing - Specification Representation for Automated Reasoning. Series in Machine Perception and Artificial Intelligence 76, WorldScientific 2010, ISBN 978-981-283-728-8, pp. 1-212 - [j13]Monica Chiarini Tremblay, Alan R. Hevner, Donald J. Berndt:
Focus Groups for Artifact Refinement and Evaluation in Design Research. Commun. Assoc. Inf. Syst. 26: 27 (2010)
2000 – 2009
- 2009
- [j12]Joni L. Jones, Rosann Webb Collins, Donald J. Berndt:
Information Markets: A Research Landscape. Commun. Assoc. Inf. Syst. 25: 27 (2009) - [j11]Monica Chiarini Tremblay, Donald J. Berndt, Stephen Luther, Philip Foulis, Dustin D. French:
Identifying fall-related injuries: Text mining the electronic medical record. Inf. Technol. Manag. 10(4): 253-265 (2009) - [c32]James A. McCart, Donald J. Berndt, Balaji Padmanabhan, Joni L. Jones:
Goal Attainment on Long Tail Websites: An Information Foraging Approach. AMCIS 2009: 556 - [c31]Monica Chiarini Tremblay, Donald J. Berndt, Alan R. Hevner:
Measuring information volatility in a health care information supply chain. DESRIST 2009 - 2008
- [j10]Dezon Finch, Donald J. Berndt:
Understanding trader heterogeneity in information markets. J. Syst. Inf. Technol. 10(2): 109-119 (2008) - [c30]Jay Jarman, James A. McCart, Donald J. Berndt, Jay Ligatti:
A Dynamic Query-Rewriting Mechanism for Role-Based Access Control in Databases. AMCIS 2008: 134 - 2007
- [j9]Monica Chiarini Tremblay, Robert M. Fuller, Donald J. Berndt, James Studnicki:
Doing more with more information: Changing healthcare planning with OLAP tools. Decis. Support Syst. 43(4): 1305-1320 (2007) - [j8]Donald J. Berndt, John W. Fisher, Jamie Griffiths Craighead, Alan R. Hevner, Stephen Luther, James Studnicki:
The role of data warehousing in bioterrorism surveillance. Decis. Support Syst. 43(4): 1383-1403 (2007) - [c29]James A. McCart, Donald J. Berndt, Alison Watkins:
Using Genetic Algorithms for Software Testing: Performance Improvement Techniques. AMCIS 2007: 222 - 2006
- [j7]Alison Watkins, Ellen M. Hufnagel, Donald J. Berndt, L. Johnson:
Using Genetic Algorithms and Decision Tree Induction to Classify Software Failures. Int. J. Softw. Eng. Knowl. Eng. 16(2): 269-292 (2006) - [j6]Christopher J. Davis, Robert M. Fuller, Monica Chiarini Tremblay, Donald J. Berndt:
Communication Challenges in Requirements Elicitation and the Use of the Repertory Grid Technique. J. Comput. Inf. Syst. 46(5): 78-86 (2006) - [c28]Jamie L. Griffiths, Donald J. Berndt:
Identifying Florida's 'At-Risk' Populations for Disaster Management Purposes: A Case Study and Research Framework. AMCIS 2006: 206 - [c27]Areej Yassin, Donald J. Berndt, Monica Chiarini Tremblay:
Investigative Data Warehousing and Mining for Database Security. AMCIS 2006: 416 - [c26]Donald J. Berndt, Joni L. Jones, Dezon Finch:
Milestone Markets: Software Cost Estimation through Market Trading. HICSS 2006 - [c25]Donald J. Berndt, Santosh Krishna, James Studnicki:
Minitrack Introduction. HICSS 2006 - [c24]Monica Chiarini Tremblay, Donald J. Berndt, James Studnicki:
Feature Selection for Predicting Surgical Outcomes. HICSS 2006 - [c23]Jamie L. Griffiths, Donald J. Berndt, Alan R. Hevner:
Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist Attacks. ISI 2006: 225-236 - 2005
- [c22]Monica Chiarini Tremblay, Donald J. Berndt, Philip Foulis, Stephen Luther:
Utilizing Text Mining Techniques to Identify Fall Related Injuries. AMCIS 2005: 109 - [c21]Donald J. Berndt, Cindy LeRouge, James Studnicki:
Introduction to the Minitrack: Data and Knowledge Management in Health Care. HICSS 2005 - [c20]Donald J. Berndt, Alison Watkins:
High Volume Software Testing using Genetic Algorithms. HICSS 2005 - 2004
- [c19]Donald J. Berndt, Alison Watkins:
Investigating the Performance of Genetic Algorithm-Based Software Test Case Generation. HASE 2004: 261-262 - [c18]Donald J. Berndt, James Studnicki:
Data and Knowledge Management in Health Care: Minitrack Introduction. HICSS 2004 - [c17]Alison Watkins, Donald J. Berndt, Kris Aebischer, John W. Fisher, L. Johnson:
Breeding Software Test Cases for Complex Systems. HICSS 2004 - [c16]Donald J. Berndt, Sunil Bhat, John W. Fisher, Alan R. Hevner, James Studnicki:
Data Analytics for Bioterrorism Surveillance. ISI 2004: 17-27 - 2003
- [j5]Donald J. Berndt, Alan R. Hevner, James Studnicki:
The Catch data warehouse: support for community health care decision-making. Decis. Support Syst. 35(3): 367-384 (2003) - [c15]Donald J. Berndt, John W. Fisher, Rama V. Rajendrababu, James Studnicki:
Measuring Healthcare Inequities using the Gini Index. HICSS 2003: 159 - [c14]Donald J. Berndt, John W. Fisher, L. Johnson, J. Pinglikar, Alison Watkins:
Breeding Software Test Cases with Genetic Algorithms. HICSS 2003: 338 - [c13]Donald J. Berndt, Alan R. Hevner, James Studnicki:
Bioterrorism Surveillance with Real-Time Data Warehousing. ISI 2003: 322-335 - 2002
- [c12]Donald J. Berndt, Cindy LeRouge, James Studnicki:
Minitrack Introduction. HICSS 2002: 141 - 2001
- [j4]Donald J. Berndt, John W. Fisher, Alan R. Hevner, James Studnicki:
Healthcare Data Warehousing and Quality Assurance. Computer 34(12): 56-65 (2001) - [c11]Donald J. Berndt:
Consumer Decision Support Systems: A Health Care Case Study. HICSS 2001 - [c10]Donald J. Berndt, Paul Jen-Hwa Hu, James Studnicki, Chih-Ping Wei:
Health Care Data Management - Minitrack Introduction. HICSS 2001 - 2000
- [j3]Alan R. Hevner, Donald J. Berndt:
Eras of business computing. Adv. Comput. 52: 1-90 (2000) - [c9]Donald J. Berndt, Ronald K. Satterfield:
Customer and household matching: resolving entity identity in data warehouses. Data Mining and Knowledge Discovery: Theory, Tools, and Technology 2000: 173-180 - [c8]Donald J. Berndt, Alan R. Hevner, James Studnicki:
Community Health Assessments: A Data Warehousing Approach. ECIS 2000: 1276-1283 - [c7]Donald J. Berndt, Alan R. Hevner, James Studnicki:
Hospital Discharge Transactions: A Data Warehouse Component. HICSS 2000 - [c6]Donald J. Berndt, Paul Jen-Hwa Hu, Chih-Ping Wei:
Databases, Data Warehousing, and Data Mining in Health Care - Introduction. HICSS 2000 - [c5]Alan R. Hevner, Donald J. Berndt, James Studnicki:
Strategic Information Systems Planning with Box Structures. HICSS 2000
1990 – 1999
- 1999
- [c4]Donald J. Berndt, Eve Jehle, Stephen B. Moore:
VSDB: A Large-Scale Vascular Screening Database. HICSS 1999 - 1998
- [c3]Donald J. Berndt, Alan R. Hevner, James Studnicki:
CATCH/IT: a data warehouse to support comprehensive assessment for tracking community health. AMIA 1998 - 1997
- [c2]Donald J. Berndt, Alan R. Hevner:
The COR Model for Analyzing Information Systems Change. HICSS (3) 1997: 198-207 - 1996
- [j2]Henry C. Lucas Jr., Donald J. Berndt, Greg Truman:
A Reengineering Framework for Evaluating a Financial Imaging System. Commun. ACM 39(5): 86-96 (1996) - [p1]Donald J. Berndt, James Clifford:
Finding Patterns in Time Series: A Dynamic Programming Approach. Advances in Knowledge Discovery and Data Mining 1996: 229-248 - 1994
- [c1]Donald J. Berndt, James Clifford:
Using Dynamic Time Warping to Find Patterns in Time Series. KDD Workshop 1994: 359-370
1980 – 1989
- 1988
- [j1]Joseph D. Benstock, Donald J. Berndt, Krishna K. Agarwal:
Graph embedding in SYNCHEM2, an expert system for organic synthesis discovery. Discret. Appl. Math. 19(1-3): 45-63 (1988)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint