Author of the publication

Target Beliefs for SME-oriented Bayesian Network-based Modeling.

, , , and . BMA@UAI, volume 1663 of CEUR Workshop Proceedings, page 21-27. CEUR-WS.org, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implicates and Prime Implicates in Random 3-SAT., and . Artif. Intell., 81 (1-2): 199-222 (1996)Compilation for Critically Constrained Knowledge Bases.. AAAI/IAAI, Vol. 1, page 510-515. AAAI Press / The MIT Press, (1996)Managing Disjunction for Practical Temporal Reasoning., , and . KR, page 36-46. Morgan Kaufmann, (1992)Exploiting Inference to Improve Temporal RDF Annotations and Queries for Machine Reading.. STIDS, volume 966 of CEUR Workshop Proceedings, page 104-111. CEUR-WS.org, (2012)Performance Evaluation for Automated Threat Detection., , , and . J. Adv. Inf. Fusion, 2 (2): 77-98 (2007)The DARPA High-Performance Knowledge Bases Project., , , , , , , and . AI Magazine, 19 (4): 25-49 (1998)Using CSP Look-Back Techniques to Solve Exceptionally Hard SAT Instances., and . CP, volume 1118 of Lecture Notes in Computer Science, page 46-60. Springer, (1996)Best-practice Time Point Ontology for Event Calculus-based Temporal Reasoning.. STIDS, volume 966 of CEUR Workshop Proceedings, page 28-34. CEUR-WS.org, (2012)Probabilistic Argument Maps for Intelligence Analysis: Capabilities Underway., , , , , , , , and . CMNA@IJCAI, volume 1876 of CEUR Workshop Proceedings, page 16-21. CEUR-WS.org, (2016)Evaluating expert-authored rules for military reasoning., , , , , , , , , and 1 other author(s). K-CAP, page 96-104. ACM, (2003)