Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Minimality of a solution update in conflict resolution: An application of revision programming to the von Neumann-Morgenstern approach., and . Int. J. Intell. Syst., 20 (9): 939-956 (2005)Historical sources as a teaching tool., , and . SIGCSE, page 401-402. ACM, (2009)Peer learning assistants in undergraduate computer science courses.. FIE, page 1-4. IEEE Computer Society, (2016)Approximating Answer Sets of Unitary Lifschitz-Woo Programs., , and . LPNMR, volume 3662 of Lecture Notes in Computer Science, page 66-78. Springer, (2005)Proactively applied encryption in multipath networks., , , and . Comput. Secur., (2016)Dynamically Differentiated Multipath Security in Fixed Bandwidth Networks., , , and . MILCOM, page 88-93. IEEE, (2014)Revising Knowledge in Multi-agent Systems Using Revision Programming with Preferences., , and . CLIMA, volume 3259 of Lecture Notes in Computer Science, page 134-158. Springer, (2004)Young women in computing: lessons learned from an educational & outreach program., , , and . SIGCSE, page 509-513. ACM, (2009)Annotated Revision Programs., , and . LPNMR, volume 1730 of Lecture Notes in Computer Science, page 49-62. Springer, (1999)A project in algorithms based on a primary historical source about catalan numbers., , , and . SIGCSE, page 318-322. ACM, (2006)