From post

Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming.

, , , и . QAPL, том 190 из Electronic Notes in Theoretical Computer Science, стр. 111-127. Elsevier, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling and detecting the cascade vulnerability problem using soft constraints., , и . SAC, стр. 383-390. ACM, (2004)Soft constraint propagation and solving in CHRs., , и . SAC, стр. 1-5. ACM, (2002)Towards a similarity-based web service discovery through soft constraint satisfaction problems., , , и . SSW@VLDB, стр. 2. ACM, (2012)Soft Constraints for Security Protocol Analysis: Confidentiality., и . PADL, том 1990 из Lecture Notes in Computer Science, стр. 108-122. Springer, (2001)Symmetry Breaking in Soft CSPs., , и . SGAI Conf., стр. 199-212. Springer, (2003)On merging two trust-networks in one with bipolar preferences., и . Math. Struct. Comput. Sci., 27 (2): 215-233 (2017)Reasoning about Secure Interoperation Using Soft Constraints., , и . Formal Aspects in Security and Trust, том 173 из IFIP, стр. 173-186. Springer, (2004)Special issue of the Knowledge Representation and Reasoning Track, Symposium on Applied Computing (SAC) 2017., , и . Fundam. Informaticae, 166 (2): 139-140 (2019)A Comparative Test on the Enumeration of Extensions in Abstract Argumentation., , и . Fundam. Informaticae, 140 (3-4): 263-278 (2015)Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria., , , и . Secur. Commun. Networks, 3 (6): 595-610 (2010)