Author of the publication

Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints.

, , and . AAAI, page 808-813. AAAI Press / The MIT Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The AAAI-13 Conference Workshops, , , , , , , , , and 13 other author(s). AI Magazine, 34 (4): 9 (2013)Constraints, Optimization and Data (Dagstuhl Seminar 14411)., , , and . Dagstuhl Reports, 4 (10): 1-31 (2014)Generating Corrective Explanations for Interactive Constraint Satisfaction., , and . CP, volume 3709 of Lecture Notes in Computer Science, page 445-459. Springer, (2005)Combinatorial search from an energy perspective., and . Inf. Process. Lett., (2019)Optimal Refutations for Constraint Satisfaction Problems., and . IJCAI, page 163-168. Professional Book Center, (2005)ReACTR: Realtime Algorithm Configuration through Tournament Rankings., , and . IJCAI, page 304-310. AAAI Press, (2015)Logic-Based Benders Decomposition for Super Solutions: An Application to the Kidney Exchange Problem., , , and . CP, volume 11802 of Lecture Notes in Computer Science, page 108-125. Springer, (2019)Towards Fast Algorithms for the Preference Consistency Problem Based on Hierarchical Models., , and . IJCAI, page 1081-1087. IJCAI/AAAI Press, (2016)Critique graphs for catalogue navigation., and . RecSys, page 115-122. ACM, (2008)Treewidth reduction for constrained separation and bipartization problems, , and . CoRR, (2009)