From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reasoning about Secure Interoperation Using Soft Constraints., , и . Formal Aspects in Security and Trust, том 173 из IFIP, стр. 173-186. Springer, (2004)Symmetry Breaking in Soft CSPs., , и . SGAI Conf., стр. 199-212. Springer, (2003)Soft Constraints for Security Protocol Analysis: Confidentiality., и . PADL, том 1990 из Lecture Notes in Computer Science, стр. 108-122. Springer, (2001)Is Arbitrage Possible in the Bitcoin Market? (Work-In-Progress Paper)., , , , и . GECON, том 11113 из Lecture Notes in Computer Science, стр. 243-251. Springer, (2018)Towards a similarity-based web service discovery through soft constraint satisfaction problems., , , и . SSW@VLDB, стр. 2. ACM, (2012)Modeling and detecting the cascade vulnerability problem using soft constraints., , и . SAC, стр. 383-390. ACM, (2004)Soft constraint propagation and solving in CHRs., , и . SAC, стр. 1-5. ACM, (2002)Soft constraint based pattern mining, и . Data & Knowledge Engineering, 62 (1): 118--137 (2007)Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints., , и . AAAI, стр. 808-813. AAAI Press / The MIT Press, (2004)Special issue of the Knowledge Representation and Reasoning Track, Symposium on Applied Computing (SAC) 2017., , и . Fundam. Informaticae, 166 (2): 139-140 (2019)