From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reasoning about Secure Interoperation Using Soft Constraints., , и . Formal Aspects in Security and Trust, том 173 из IFIP, стр. 173-186. Springer, (2004)Modeling and detecting the cascade vulnerability problem using soft constraints., , и . SAC, стр. 383-390. ACM, (2004)Soft constraint propagation and solving in CHRs., , и . SAC, стр. 1-5. ACM, (2002)Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria., , , и . Secur. Commun. Networks, 3 (6): 595-610 (2010)Special issue of the Knowledge Representation and Reasoning Track, Symposium on Applied Computing (SAC) 2017., , и . Fundam. Informaticae, 166 (2): 139-140 (2019)A Comparative Test on the Enumeration of Extensions in Abstract Argumentation., , и . Fundam. Informaticae, 140 (3-4): 263-278 (2015)From soft constraints to bipolar preferences: modelling framework and solving issues., , , и . J. Exp. Theor. Artif. Intell., 22 (2): 135-158 (2010)Is Arbitrage Possible in the Bitcoin Market? (Work-In-Progress Paper)., , , , и . GECON, том 11113 из Lecture Notes in Computer Science, стр. 243-251. Springer, (2018)On merging two trust-networks in one with bipolar preferences., и . Math. Struct. Comput. Sci., 27 (2): 215-233 (2017)Soft Constraints for Security Protocol Analysis: Confidentiality., и . PADL, том 1990 из Lecture Notes in Computer Science, стр. 108-122. Springer, (2001)