Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mixed-Depth Representations of Natural Language Text, and . Text-Based Intelligent Systems: Current research and practice in information extraction and retrieval, Lawrence Erlbaum, Hillsdale (New Jersey), Hove and London, (1992)Counterfactuals and Updates as Inverse Modalities., , and . TARK, page 163-173. Morgan Kaufmann, (1996)Formal Analysis of UMTS Privacy, , , and . CoRR, (2011)Practical machine learning with python on DSX., , , , , and . CASCON, page 403-405. ACM, (2018)Formalisms for multi-agent systems., , , , , , and . Knowl. Eng. Rev., 12 (3): 315-321 (1997)Representing Defaults as Sentences with Reduced Priority.. KR, page 649-660. Morgan Kaufmann, (1992)In defence of digital contact-tracing: human rights, South Korea and Covid-19.. Int. J. Pervasive Comput. Commun., 16 (4): 383-407 (2020)Ideal Agents Sharing (some!) Knowledge., and . ECAI, page 557-561. John Wiley and Sons, (1998)Using Reed-Muller Codes for Classification with Rejection and Recovery., , and . CoRR, (2023)Privacy-supporting cloud computing by in-browser key translation., , and . J. Comput. Secur., 21 (6): 847-880 (2013)