From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving Web Application Firewalls through Anomaly Detection., , , и . ICMLA, стр. 779-784. IEEE, (2018)A Tutorial on Co-Inductive Types in Coq, и . (2006)Possibilistic-Based Bidding Strategies in Electronic Auctions., , , и . ECAI, стр. 575-579. John Wiley and Sons, (1998)Structural Recursive Definitions in Type Theory.. ICALP, том 1443 из Lecture Notes in Computer Science, стр. 397-408. Springer, (1998)An Application of Co-inductive Types in Coq: Verification of the Alternating Bit Protocol.. TYPES, том 1158 из Lecture Notes in Computer Science, стр. 135-152. Springer, (1995)Codifying Guarded Definitions with Recursive Schemes.. TYPES, том 996 из Lecture Notes in Computer Science, стр. 39-59. Springer, (1994)Bidding Strategies for Trading Agents in Auction-Based Tournaments., , , и . AMET, том 1571 из Lecture Notes in Computer Science, стр. 151-165. Springer, (1998)Type-based termination of recursive definitions., , , , и . Math. Struct. Comput. Sci., 14 (1): 97-141 (2004)Machine learning-assisted virtual patching of web applications., , , и . CoRR, (2018)Structural Recursive Definitions in Type Theory. Automata, Languages and Programming, стр. 397-408. (1998)