Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Invariants through Soft Unification., and . CoRR, (2019)FF-NSL: Feed-Forward Neural-Symbolic Learner., , , and . CoRR, (2021)Making inconsistency respectable in software development., , and . J. Syst. Softw., 58 (2): 171-180 (2001)Introduction to the 36th International Conference on Logic Programming Special Issue II., and . Theory Pract. Log. Program., 20 (6): 815-817 (2020)Using Argumentation Logic for Firewall Policy Specification and Analysis., , , and . DSOM, volume 4269 of Lecture Notes in Computer Science, page 185-196. Springer, (2006)Foundations of Logic-Based Trust Management., , and . IEEE Symposium on Security and Privacy, page 161-175. IEEE Computer Society, (2012)Using an ASG Based Generative Policy to Model Human Rules., , , and . SMARTCOMP, page 99-103. IEEE, (2019)Hierarchies of Reward Machines., , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 10494-10541. PMLR, (2023)Towards Neural-Symbolic Learning to support Human-Agent Operations., , , , and . FUSION, page 1-8. IEEE, (2021)Policy based Ensembles for applying ML on Big Data., , , , and . IEEE BigData, page 4038-4044. IEEE, (2019)