Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The inverse protein folding problem on 2D and 3D lattices, , , , , and . Discrete Applied Mathematics, 155 (6-7): 719-732 (2007)On Theory Revision with Queries., and . COLT, page 41-52. ACM, (1999)On k-term DNF with largest number of prime implicants, , and . Electron. Colloquium Comput. Complex., (2005)When Is an Algorithm Transparent? Predictive Analytics, Privacy, and Public Policy., and . IEEE Secur. Priv., 16 (3): 18-25 (2018)Who is Watching You Eat?, , and . MPREF@AAAI, volume WS-14-10 of AAAI Technical Report, AAAI Press, (2014)Computing Curricula 2005: The Overview Report., , , , , , , , , and . SIGCSE, page 456-457. ACM, (2006)A comprehensive representation of the computing and information disciplines., , and . SIGCSE, page 199-200. ACM, (2006)Theory revision with queries: Horn, read-once, and parity formulas., , , and . Artif. Intell., 156 (2): 139-176 (2004)Curriculum update from the ACM education board: CS2008 and a report on masters degrees., , , , , , and . SIGCSE, page 530-531. ACM, (2008)Beyond Notice and Choice: Privacy, Norms, and Consent, and . Journal of High Technology Law, 14 (2): 370--414 (2014)