From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed Constraint-Based Local Search., , и . CP, том 4204 из Lecture Notes in Computer Science, стр. 344-358. Springer, (2006)Newton - Constraint Programming over Nonlinear Constraints., , и . Sci. Comput. Program., 30 (1-2): 83-118 (1998)Integrating Access Control into UML for Secure Software Modeling and Analysis., , , и . Int. J. Secur. Softw. Eng., 1 (1): 1-19 (2010)The Time Complexity of A* with Approximate Heuristics on Multiple-Solution Search Spaces., , , и . J. Artif. Intell. Res., (2012)Scheduling Abstractions for Local Search., и . CPAIOR, том 3011 из Lecture Notes in Computer Science, стр. 319-334. Springer, (2004)Search Strategies for Floating Point Constraint Systems., , , и . CP, том 10416 из Lecture Notes in Computer Science, стр. 707-722. Springer, (2017)Securely and Automatically Deploying Micro-services in an Hybrid Cloud Infrastructure., , и . CP, том 11008 из Lecture Notes in Computer Science, стр. 613-628. Springer, (2018)HADDOCK: A Language and Architecture for Decision Diagram Compilation., , и . CP, том 12333 из Lecture Notes in Computer Science, стр. 531-547. Springer, (2020)A design flow with integrated verification of requirements and faults in safety-critical systems., , , и . SoSE, стр. 1-6. IEEE, (2017)Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting., , , , , , и . ACSAC, стр. 30-39. IEEE Computer Society, (2007)