Author of the publication

Computing Horn Strong Backdoor Sets Thanks to Local Search.

, , , and . ICTAI, page 139-143. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Modal Logic for Hypothesis Theory., and . Fundam. Informaticae, 21 (1/2): 89-101 (1994)A Resilient Behavior Approach Based on Non-monotonic Logic., , , and . MICAI, volume 11835 of Lecture Notes in Computer Science, page 403-413. Springer, (2019)Modal logic based theory for non-monotonic reasoning., and . J. Appl. Non Class. Logics, 3 (1): 73-92 (1993)Operator Decision in Simulation of Biological Systems., and . AINA Workshops, page 501-506. IEEE Computer Society, (2011)Nonmonotonic Reasoning and Databases., and . Advances in Data Base Theory, page 239-284. New York, Plemum Press, (1982)Supposition-Based Logic for Automated Nonmontonic Reasoning., and . CADE, volume 310 of Lecture Notes in Computer Science, page 592-601. Springer, (1988)A Representation Theorem for Preferential Logics., and . KR, page 453-460. Morgan Kaufmann, (1996)A temporal revision model for reasoning about world change., and . Int. J. Intell. Syst., 9 (1): 131-142 (1994)Saturation, Nonmonotonic Reasoning and the Closed-World Assumption., and . Artif. Intell., 25 (1): 13-63 (1985)Prioritized Transitions for Updates., and . KI, volume 861 of Lecture Notes in Computer Science, page 393. Springer, (1994)