Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Timeline Representation for the Jade Rabbit Rover., , , and . KSEM (2), volume 11062 of Lecture Notes in Computer Science, page 69-77. Springer, (2018)Making FF Faster in ADL Domains., , and . ICNC (2), page 160-164. IEEE Computer Society, (2007)On the Discovery and Utility of Precedence Constraints in Temporal Planning., , and . AAAI, page 1788-1789. AAAI Press, (2011)Towards a Free Text Dataset for Hiding Quasi-Identifiers., , , and . ACAI, page 89:1-89:6. ACM, (2021)Enhancing the Context-Enhanced Additive Heuristic with Precedence Constraints., , and . ICAPS, AAAI, (2009)On the Utility of Recovering Dropped Words in Chinese Named Entity Recognition., , and . ICIIT, page 58-62. ACM, (2021)On the utility of landmarks in SAT based planning., and . Knowl. Based Syst., (2012)A Case Study of Container Behavior Analysis with Cloud Resource Profile., , , and . PAAP, page 169-172. IEEE, (2021)HyBuffer: A Distributed Hybrid Shared Buffer for Multi-master Databases., , , , , , and . DASFAA (6), volume 14855 of Lecture Notes in Computer Science, page 474-483. Springer, (2024)DiffusionTracker: Targets Denoising Based on Diffusion Model for Visual Tracking., , , , , and . PRCV (12), volume 14436 of Lecture Notes in Computer Science, page 225-237. Springer, (2023)