Author of the publication

Visualization in Mechanical Geometry Theorem Proving.

, , and . SCAI, volume 28 of Frontiers in Artificial Intelligence and Applications, page 478-482. IOS Press, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing an SOA-Based Earthquake Forewarning System using BPMN., and . Software Engineering Research and Practice, page 593-598. CSREA Press, (2010)Engine fault diagnosis based on multi-sensor information fusion using Dempster-Shafer evidence theory., and . Inf. Fusion, 8 (4): 379-386 (2007)Security Labs for Software Defined Networks in CloudLab., , and . SIGCSE, page 1235. ACM, (2019)A User Study: Abuse Cases Derived from Use Case Description and CAPEC Attack Patterns., and . ICISA, volume 514 of Lecture Notes in Electrical Engineering, page 239-249. Springer, (2018)A course module on web tracking and privacy., , , , and . InfoSecCD, page 10:1-10:7. ACM, (2015)A course module on mobile malware., , , , and . InfoSecCD, page 10:1. ACM, (2014)Teaching Security Management for Mobile Devices., , , and . SIGITE, page 14-19. ACM, (2016)Ultrasonic Diagnosis and Analysis of the Effect of Labor Analgesia on Early Pelvic Floor Function and Pelvic Floor Dysfunction., , , and . J. Medical Imaging Health Informatics, 11 (7): 1903-1910 (2021)Touch-Based Active Cloud Authentication Using Traditional Machine Learning and LSTM on a Distributed Tensorflow Framework., , , , and . Int. J. Comput. Intell. Appl., 18 (4): 1950022:1-1950022:16 (2019)A Survey of Attacks and Defenses for Deep Neural Networks., , and . CSR, page 254-261. IEEE, (2023)