Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

More fires and more fighters., , , , and . Discret. Appl. Math., 161 (16-17): 2410-2419 (2013)Matchings in Graphs of Odd Regularity and Girth., , and . Electron. Notes Discret. Math., (2013)Design method for monolithic DC-DC converters based on the losses optimization of the power stage., , and . APCCAS, page 1872-1875. IEEE, (2008)Risk Management Information System Architecture for a Hospital Center: The Case of CHTMAD., , , , and . Int. J. Heal. Inf. Syst. Informatics, 8 (4): 58-72 (2013)TechPaper - An Interactive Learning Information System Game., , , , , , , and . ICT4AWE, page 276-284. SciTePress, (2018)Slash and burn on graphs - Firefighting with general weights., , , , and . Discret. Appl. Math., (2016)Development of an Integrated Solution for Intrusion Detection: A Model Based on Data Correlation., , and . ICNS, page 37. IEEE Computer Society, (2006)The BEAM: A first EAM Implementation., and . APPIA-GULP-PRODE, page 425-440. (1999)Sequential Pattern Mining in Multi-relational Datasets., , and . CAEPIA, volume 5988 of Lecture Notes in Computer Science, page 121-130. Springer, (2009)Cuts and Side-Effects in And-Or Parallel Prolog., and . J. Log. Program., 27 (1): 45-71 (1996)