Author of the publication

Containment of Monadic Datalog Programs via Bounded Clique-Width.

, , and . ICALP (2), volume 9135 of Lecture Notes in Computer Science, page 427-439. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RecSys Challenge 2016: job recommendations based on preselection of offers and gradient boosting., , , , and . RecSys Challenge, page 10:1-10:4. ACM, (2016)Satisfiability for SCULPT-Schemas for CSV-Like Data., , , and . ICDT, volume 98 of LIPIcs, page 14:1-14:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Monadic Datalog and Regular Tree Pattern Queries., , and . MFCS (1), volume 8634 of Lecture Notes in Computer Science, page 426-437. Springer, (2014)Containment of Monadic Datalog Programs via Bounded Clique-Width., , and . ICALP (2), volume 9135 of Lecture Notes in Computer Science, page 427-439. Springer, (2015)Predicting winrate of Hearthstone decks using their archetypes., , and . FedCSIS, volume 15 of Annals of Computer Science and Information Systems, page 193-196. (2018)Eliminating Recursion from Monadic Datalog Programs on Trees., , and . MFCS (1), volume 9234 of Lecture Notes in Computer Science, page 394-406. Springer, (2015)