Author of the publication

C2: The Case for a Network Configuration Checking Language.

, and . POLICY, page 29-36. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NSL: Hybrid Interpretable Learning From Noisy Raw Data., , , , and . CoRR, (2020)A Security-Constrained Reinforcement Learning Framework for Software Defined Networks., , , and . ICC, page 1-6. IEEE, (2021)Ground plane detection using visual and inertial data fusion., and . ICECS, page 479-482. IEEE, (1998)Theory of Disjunctive Logic Programs., , and . Computational Logic - Essays in Honor of Alan Robinson, page 613-639. The MIT Press, (1991)Authorization and Obligation Policies in Dynamic Systems., and . ICLP, volume 5366 of Lecture Notes in Computer Science, page 22-36. Springer, (2008)Visualization for Access Control Policy Analysis Results Using Multi-level Grids., , , and . POLICY, page 25-28. IEEE Computer Society, (2009)WF³: A Semantics for Negation in Normal Disjunctive Logic Programs., , and . ISMIS, volume 542 of Lecture Notes in Computer Science, page 459-468. Springer, (1991)Evaluating role mining algorithms., , , , , and . SACMAT, page 95-104. ACM, (2009)A Resolution-based Procedure for Default Theories with Extensions., and . NMELP, volume 927 of Lecture Notes in Computer Science, page 101-126. Springer, (1994)Remote lab for Stochastic Computing using reconfigurable logic., and . exp.at, page 173-174. IEEE, (2015)