Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing the V&V process for critical systems., , and . GECCO, page 1139. ACM, (2007)An Adversarial Planning Approach to Go., , , and . Computers and Games, volume 1558 of Lecture Notes in Computer Science, page 93-112. Springer, (1998)Making Sense of Requirements, Sooner., and . Computer, 39 (10): 112-114 (2006)Development of Correct Transformation Schemata for Prolog Programs., and . LOPSTR, volume 1463 of Lecture Notes in Computer Science, page 263-281. Springer, (1997)Applying adversarial planning techniques to Go., , , and . Theor. Comput. Sci., 252 (1-2): 45-82 (2001)Abstract: Proof Planning with Program Schemas.. LOPSTR, volume 1559 of Lecture Notes in Computer Science, page 313-315. Springer, (1998)Proofs About Lists Using Ellipsis., and . LPAR, volume 1705 of Lecture Notes in Computer Science, page 1-12. Springer, (1999)System Description: Proof Planning in Higher-Order Logic with Lambda-Clam., , and . CADE, volume 1421 of Lecture Notes in Computer Science, page 129-133. Springer, (1998)Semi-supervised Word Sense Disambiguation with Neural Models., , , , and . COLING, page 1374-1385. ACL, (2016)Automating Traceability for Generated Software Artifacts ., and . ASE, page 24-33. IEEE Computer Society, (2004)