Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preventing Supply Chain Vulnerabilities in Java with a Fine-Grained Permission Manager., , , , and . CoRR, (2023)SomeWhere: A Scalable Peer-to-Peer Infrastructure for Querying Distributed Ontologies., , , , and . OTM Conferences (1), volume 4275 of Lecture Notes in Computer Science, page 698-703. Springer, (2006)Doppler Signal Detection And Particle Time Of Flight Estimation Using Wavelet Transform For Acoustic Velocity Measurement., , , , and . ICASSP (3), page 145-148. IEEE, (2006)Extension of Generalized Hammerstein model to non-polynomial inputs., , and . EUSIPCO, page 21-25. IEEE, (2016)Viewing Boundary Öbjects" as Boundary Constructions., , , and . HICSS, page 339. IEEE Computer Society, (2008)Challenges in the QBF Arena: the SAT'03 Evaluation of QBF Solvers., , and . SAT, volume 2919 of Lecture Notes in Computer Science, page 468-485. Springer, (2003)Extreme Cases in SAT Problems., and . SAT, volume 9710 of Lecture Notes in Computer Science, page 87-103. Springer, (2016)Learning Polynomials over GF(2) in a SAT Solver - (Poster Presentation)., and . SAT, volume 7317 of Lecture Notes in Computer Science, page 496-497. Springer, (2012)GUNSAT: A Greedy Local Search Algorithm for Unsatisfiability., and . IJCAI, page 2256-2261. (2007)Refining Restarts Strategies for SAT and UNSAT., and . CP, volume 7514 of Lecture Notes in Computer Science, page 118-126. Springer, (2012)