Author of the publication

Generalizing GraphPlan by Formulating Planning as a CSP.

, and . IJCAI, page 954-960. Morgan Kaufmann, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalizing GraphPlan by Formulating Planning as a CSP., and . IJCAI, page 954-960. Morgan Kaufmann, (2003)Leakage-Resilient Cryptography from Minimal Assumptions., , , and . IACR Cryptology ePrint Archive, (2012)Leakage-Resilient Cryptography from Minimal Assumptions., , , and . J. Cryptol., 29 (3): 514-551 (2016)Auto-AVSR: Audio-Visual Speech Recognition with Automatic Labels., , , , , and . ICASSP, page 1-5. IEEE, (2023)Cryptographic Algorithms for the SecureDelegation of Multiparty Computation.. New York University, USA, (2014)Cogans For Unsupervised Visual Speech Adaptation To New Speakers., , , and . ICASSP, page 6294-6298. IEEE, (2020)Towards Estimating the Upper Bound of Visual-Speech Recognition: The Visual Lip-Reading Feasibility Database., , and . FG, page 208-215. IEEE Computer Society, (2017)A modified firefly algorithm for the inverse kinematics solutions of robotic manipulators., , , , and . Integr. Comput. Aided Eng., 28 (3): 257-275 (2021)A painless gradient-assisted multi-objective memetic mechanism for solving continuous bi-objective optimization problems., , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2010)Learning of meaningful visual representations for continuous lip-reading.. Pompeu Fabra University, Spain, (2021)