​
Login / Signup
Jeffrey Jenkins
Publication Activity (10 Years)
Years Active: 2010-2021
Publications (10 Years): 6
Top Topics
Diffusion Tensor
Diffeomorphic Registration
Multicriteria Optimization
Anatomical Structures
Top Venues
NeuroImage
IEEE BigData
CoRR
Adv. Complex Syst.
</>
Publications
</>
Felber J. Arroyave
,
Oscar Yandy Romero Goyeneche
,
Meredith Gore
,
Gaston Heimeriks
,
Jeffrey Jenkins
,
Alexander M. Petersen
On the social and cognitive dimensions of wicked environmental problems characterized by conceptual and solution uncertainty.
CoRR
(2021)
Felber J. Arroyave
,
Oscar Yandy Romero Goyeneche
,
Meredith Gore
,
Gaston Heimeriks
,
Jeffrey Jenkins
,
Alexander M. Petersen
On the Social and Cognitive Dimensions of Wicked Environmental Problems characterized by Conceptual and solution uncertainty.
Adv. Complex Syst.
24 (3-4) (2021)
Felber J. Arroyave
,
Alexander M. Petersen
,
Jeffrey Jenkins
,
Rafael Hurtado
Multiplex networks reveal geographic constraints on illicit wildlife trafficking.
Appl. Netw. Sci.
5 (1) (2020)
Elizabeth B. Hutchinson
,
Susan C. Schwerin
,
Kryslaine Radomski
,
Neda Sadeghi
,
Jeffrey Jenkins
,
Michal E. Komlosh
,
M. Okan Irfanoglu
,
Sharon L. Juliano
,
Carlo Pierpaoli
Population based MRI and DTI templates of the adult ferret brain and tools for voxelwise analysis.
NeuroImage
152 (2017)
M. Okan Irfanoglu
,
Amritha Nayak
,
Jeffrey Jenkins
,
Elizabeth B. Hutchinson
,
Neda Sadeghi
,
Cibu Thomas
,
Carlo Pierpaoli
DR-TAMAS: Diffeomorphic Registration for Tensor Accurate Alignment of Anatomical Structures.
NeuroImage
132 (2016)
Jeffrey Jenkins
,
Lin-Ching Chang
,
Elizabeth B. Hutchinson
,
M. Okan Irfanoglu
,
Carlo Pierpaoli
Harmonization of methods to facilitate reproducibility in medical data processing: Applications to diffusion tensor magnetic resonance imaging.
IEEE BigData
(2016)
Harold Szu
,
Charles Hsu
,
Jeffrey Jenkins
,
Jefferson M. Willey
,
Joseph Landa
Capturing significant events with neural networks.
Neural Networks
29 (2012)
Gray Ross
,
Jeffrey Jenkins
How Secure is Your System? Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior.
AMCIS
(2010)