Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Taming Numbers and Durations in the Model Checking Integrated Planning System.. PuK, (2002)The Deterministic Part of IPC-4: An Overview., and . J. Artif. Intell. Res., (2005)Efficient Explicit-State Model Checking on General Purpose Graphics Processors., and . SPIN, volume 6349 of Lecture Notes in Computer Science, page 106-123. Springer, (2010)Route Planning and Map Inference with Global Positioning Traces., and . Computer Science in Perspective, volume 2598 of Lecture Notes in Computer Science, page 128-151. Springer, (2003)Automated Creation of Pattern Database Search Heuristics.. MoChArt, volume 4428 of Lecture Notes in Computer Science, page 35-50. Springer, (2006)Two Constant-Factor-Optimal Realizations of Adaptive Heapsort., , and . IWOCA, volume 7056 of Lecture Notes in Computer Science, page 195-208. Springer, (2011)A Catalogue of Algorithms for Building Weak Heaps., , and . IWOCA, volume 7643 of Lecture Notes in Computer Science, page 249-262. Springer, (2012)Suffix Tree Automata in State Space Search.. KI, volume 1303 of Lecture Notes in Computer Science, page 381-384. Springer, (1997)Learning Event Time Series for the Automated Quality Control of Videos., and . KI, volume 9904 of Lecture Notes in Computer Science, page 148-154. Springer, (2016)Combining Conditional Random Fields and Background Knowledge for Improved Cyber Security., , and . KI, volume 8077 of Lecture Notes in Computer Science, page 284-287. Springer, (2013)