Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flexible access control policy specification with constraint logic programming., and . ACM Trans. Inf. Syst. Secur., 6 (4): 501-546 (2003)Global difference constraint propagation for finite domain solvers., , and . PPDP, page 226-235. ACM, (2008)Finding all minimal unsatisfiable subsets., , and . PPDP, page 32-43. ACM, (2003)Compiling Query Constraints., and . PODS, page 56-67. ACM Press, (1994)Sharing and groundness dependencies in logic programs., , and . ACM Trans. Program. Lang. Syst., 21 (5): 948-976 (1999)A Constraint Logic Programming Shell., and . PLILP, volume 456 of Lecture Notes in Computer Science, page 75-88. Springer, (1990)Termination Analysis with Types Is More Accurate., , and . ICLP, volume 2916 of Lecture Notes in Computer Science, page 254-268. Springer, (2003)Towards Flexible Graphical Communication Using Adaptive Diagrams., , and . ASIAN, volume 3321 of Lecture Notes in Computer Science, page 380-394. Springer, (2004)Rail Capacity Modelling with Constraint Programming., and . CPAIOR, volume 9676 of Lecture Notes in Computer Science, page 170-186. Springer, (2016)Minimum Cardinality Matrix Decomposition into Consecutive-Ones Matrices: CP and IP Approaches., , , and . CPAIOR, volume 4510 of Lecture Notes in Computer Science, page 1-15. Springer, (2007)