From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Middle-Out Reasoning for Logic Program Synthesis., , и . ICLP, стр. 441-455. MIT Press, (1993)Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System., , , и . CoRR, (2023)A Conservative Extension of First-order Logic and Its Application to Theorem Proving., и . FSTTCS, том 761 из Lecture Notes in Computer Science, стр. 151-160. Springer, (1993)Verification Of Combinational Logic in Nuprl., и . Hardware Specification, Verification and Synthesis, том 408 из Lecture Notes in Computer Science, стр. 333-357. Springer, (1989)Automatic Generation of Smart, Security-Aware GUI Models., , , и . ESSoS, том 5965 из Lecture Notes in Computer Science, стр. 201-217. Springer, (2010)An Adaptation of Proof-Planning to Declarer Play in Bridge., , и . ECAI, стр. 72-76. John Wiley and Sons, (1992)Dispute Resolution in Voting., , и . CSF, стр. 1-16. IEEE, (2020)Secure data deletion from persistent media., , , и . ACM Conference on Computer and Communications Security, стр. 271-284. ACM, (2013)Editorial., , и . High. Order Symb. Comput., 17 (3): 171 (2004)Mining ABAC Rules from Sparse Logs., , и . EuroS&P, стр. 31-46. IEEE, (2018)