From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Preventing Supply Chain Vulnerabilities in Java with a Fine-Grained Permission Manager., , , , и . CoRR, (2023)Extension of Generalized Hammerstein model to non-polynomial inputs., , и . EUSIPCO, стр. 21-25. IEEE, (2016)SomeWhere: A Scalable Peer-to-Peer Infrastructure for Querying Distributed Ontologies., , , , и . OTM Conferences (1), том 4275 из Lecture Notes in Computer Science, стр. 698-703. Springer, (2006)Doppler Signal Detection And Particle Time Of Flight Estimation Using Wavelet Transform For Acoustic Velocity Measurement., , , , и . ICASSP (3), стр. 145-148. IEEE, (2006)Viewing Boundary Öbjects" as Boundary Constructions., , , и . HICSS, стр. 339. IEEE Computer Society, (2008)GUNSAT: A Greedy Local Search Algorithm for Unsatisfiability., и . IJCAI, стр. 2256-2261. (2007)Refining Restarts Strategies for SAT and UNSAT., и . CP, том 7514 из Lecture Notes in Computer Science, стр. 118-126. Springer, (2012)Challenges in the QBF Arena: the SAT'03 Evaluation of QBF Solvers., , и . SAT, том 2919 из Lecture Notes in Computer Science, стр. 468-485. Springer, (2003)Extreme Cases in SAT Problems., и . SAT, том 9710 из Lecture Notes in Computer Science, стр. 87-103. Springer, (2016)Learning Polynomials over GF(2) in a SAT Solver - (Poster Presentation)., и . SAT, том 7317 из Lecture Notes in Computer Science, стр. 496-497. Springer, (2012)