From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Specifying and Verifying Meta-Security by Means of Semantic Web Methods., , , и . SOCO-CISIS-ICEUTE, том 299 из Advances in Intelligent Systems and Computing, стр. 355-365. Springer, (2014)Algebraic combinatorics in bounded induction.. Ann. Pure Appl. Log., 172 (2): 102885 (2021)Estimating Re-identification Risk by Means of Formal Conceptualization., , и . CISIS-ICEUTE, том 1400 из Advances in Intelligent Systems and Computing, стр. 13-22. Springer, (2021)Towards a Soft Evaluation and Refinement of Tagging in Digital Humanities., , и . SOCO, том 368 из Advances in Intelligent Systems and Computing, стр. 79-89. Springer, (2015)Modeling Lexicon Emergence as Concept Emergence in Networks., , и . AECIA, том 427 из Advances in Intelligent Systems and Computing, стр. 409-420. Springer, (2015)A model of three-way decisions for Knowledge Harnessing., , и . Int. J. Approx. Reason., (2020)A Topological Study of the Upward Refinement Operators in ILP., , и . ILP Work-in-progress reports, том 35 из CEUR Workshop Proceedings, CEUR-WS.org, (2000)On Overspill Principles and Axiom Schemes for Bounded Formulas., , и . Math. Log. Q., (1996)Ontology Cleaning by Mereotopological Reasoning., , и . DEXA Workshops, стр. 132-137. IEEE Computer Society, (2004)Emergent Concepts on Knowledge Intensive Processes., , , и . ICCCI, том 8733 из Lecture Notes in Computer Science, стр. 282-291. Springer, (2014)