From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Redundancy of Variables in CLP (R)., , и . ILPS, стр. 75-93. MIT Press, (1993)Consistency and Set Intersection., и . IJCAI, стр. 263-270. Morgan Kaufmann, (2003)Viz: a visual analysis suite for explaining local search behavior., , и . UIST, стр. 57-66. ACM, (2006)Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks., и . RAID, том 3858 из Lecture Notes in Computer Science, стр. 146-164. Springer, (2005)Forward and Backward Chaining in Constraint Programming (Abstract)., , и . LPNMR, том 1265 из Lecture Notes in Computer Science, стр. 1. Springer, (1997)Detecting Malware Through Anti-analysis Signals - A Preliminary Study., и . CANS, том 10052 из Lecture Notes in Computer Science, стр. 542-551. (2016)Quantifying the Effects of More Timely Certificate Revocation on Lightweight Mobile Devices., и . Metrisec@ESEM, стр. 31-40. IEEE, (2011)A Hybrid Dynamic Arity Search Heuristic for Constraint Programming., и . ICTAI, стр. 126-131. IEEE, (2020)Stack Bounds Protection with Low Fat Pointers., , и . NDSS, The Internet Society, (2017)Encoding Multi-Valued Decision Diagram Constraints as Binary Constraint Trees., и . AAAI, стр. 3850-3858. AAAI Press, (2022)