Author of the publication

Visualization in Mechanical Geometry Theorem Proving.

, , and . SCAI, volume 28 of Frontiers in Artificial Intelligence and Applications, page 478-482. IOS Press, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatiotemporal Evolutions of the Suspended Particulate Matter in the Yellow River Estuary, Bohai Sea and Characterized by Gaofen Imagery., , , , , , , , , and . Remote. Sens., 15 (19): 4769 (October 2023)An Automated Security Concerns Recommender Based on Use Case Specification Ontology., , , and . Autom. Softw. Eng., 29 (2): 42 (2022)Retrieving relevant CAPEC attack patterns for secure software development., , , and . CISR, page 33-36. ACM, (2014)A Survey of U.S. Laws for Health Information Security & Privacy., , , and . Int. J. Inf. Secur. Priv., 6 (4): 40-54 (2012)A Method for Developing Abuse Cases and Its Evaluation., , , and . J. Softw., 11 (5): 520-527 (2016)A Personal Software Process Tool for Eclipse Environment., , , and . Software Engineering Research and Practice, page 717-723. CSREA Press, (2005)Case studies for teaching physical security and security policy., , , and . InfoSecCD, page 21-26. ACM, (2010)Teaching Operating Systems Using Visualization: A Comparative Study., , , and . Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education, Springer, (2008)Implementing a network intrusion detection system using semi-supervised support vector machine and random forest., , , , and . ACM Southeast Conference, page 180-184. ACM, (2021)Securing analysis patterns., and . ACM Southeast Regional Conference, page 288-293. ACM, (2007)