From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Constraint-Based Scheduler for Batch Manufacturing., и . IEEE Expert, 12 (1): 49-56 (1997)Collaborative Filtering for Community Threats., , , и . AAAI Spring Symposium: AI Technologies for Homeland Security, стр. 130-132. AAAI, (2005)Contract-Based Distributed Scheduling for Distributed Processing., и . AAAI Workshop: Constraints & Agents, стр. 118-128. AAAI Press, (1997)Conditional Linear Planning., и . AIPS, стр. 80-85. AAAI, (1994)Course of Action Generation for Cyber Security Using Classical Planning., , , и . ICAPS, стр. 12-21. AAAI, (2005)Automated Vulnerability Analysis Using AI Planning., , , и . AAAI Spring Symposium: AI Technologies for Homeland Security, стр. 46-53. AAAI, (2005)PRONTOE - A Case Study for Developing Ontologies for Operations., , , , и . KEOD, стр. 17-25. SciTePress, (2013)Epsilon-Safe Planning, и . CoRR, (2013)Expressive Planning and Explicit Knowledge., и . AIPS, стр. 110-117. AAAI, (1996)PRONTOE: An Ontology Editor for Domain Experts., , , , и . IC3K, том 454 из Communications in Computer and Information Science, стр. 153-167. Springer, (2013)