Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compiling CP subproblems to MDDs and d-DNNFs., , , and . Constraints An Int. J., 24 (1): 56-93 (2019)Closure Operators for ROBDDs., and . VMCAI, volume 3855 of Lecture Notes in Computer Science, page 1-16. Springer, (2006)Size-Change Termination Analysis in k-Bits., , , and . ESOP, volume 3924 of Lecture Notes in Computer Science, page 230-245. Springer, (2006)String Constraint Solving: Past, Present and Future., , , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 2875-2876. IOS Press, (2020)A Secure Group Agreement (SGA) Protocol for Peer-to-Peer Applications., , and . AINA Workshops (1), page 24-29. IEEE Computer Society, (2007)Dauphin: A Signal Processing Language - Statistical Signal Processing Made Easy., , and . DICTA, page 1-8. IEEE, (2015)Optimal Bounds for Floating-Point Addition in Constant Time., , , and . ARITH, page 159-166. IEEE, (2019)Algorithm Selection for Dynamic Symbolic Execution: A Preliminary Study., , , , and . LOPSTR, volume 12561 of Lecture Notes in Computer Science, page 192-209. Springer, (2020)Secure random number agreement for peer-to-peer applications., , and . ICPADS, page 1-8. IEEE Computer Society, (2007)Adtpp: lightweight efficient safe polymorphic algebraic data types for C., , and . Softw. Pract. Exp., 46 (12): 1685-1703 (2016)