Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Adversarial Planning Approach to Go., , , and . Computers and Games, volume 1558 of Lecture Notes in Computer Science, page 93-112. Springer, (1998)On the notion of interestingness in automated mathematical discovery., , and . Int. J. Hum. Comput. Stud., 53 (3): 351-375 (2000)Commentary on: solving symbolic equations with PRESS., , , and . SIGSAM Bull., 22 (2): 27-40 (1988)MATHsAiD: Automated mathematical theory exploration., , and . Appl. Intell., 47 (3): 585-606 (2017)A Broader Interpretation of Logic in Logic Programming.. ICLP/SLP, page 1624-1648. MIT Press, (1988)Inconstancy: An Ontology Repair Plan for Adding Hidden Variables., and . AAAI Fall Symposium: Automated Scientific Discovery, volume FS-08-03 of AAAI Technical Report, page 10-17. AAAI, (2008)Proof planning for maintainable configuration systems., , and . Artif. Intell. Eng. Des. Anal. Manuf., 12 (4): 345-356 (1998)Incidence Calculus: A Mechanism for Probabilistic Reasoning.. J. Autom. Reason., 1 (3): 263-283 (1985)Models of Interaction as a Grounding for Peer-to-Peer Knowledge Sharing, , , , , , , , , and 9 other author(s). LNCS Advances in Web Semantics, (2007)Making a productive use of failure to generate witnesses for coinduction from divergent proof attempts., , and . Ann. Math. Artif. Intell., 29 (1-4): 99-138 (2000)