Author of the publication

Solving the Snake in the Box Problem with Heuristic Search: First Results.

, , , , , and . SOCS, page 96-104. AAAI Press, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is the Online Discussion Manipulated? Quantifying the Online Discussion Authenticity within Online Social Media., , and . CoRR, (2017)Extended Framework for Target Oriented Network Intelligence Collection., , , and . SOCS, page 131-138. AAAI Press, (2014)Solving the Snake in the Box Problem with Heuristic Search: First Results., , , , , and . SOCS, page 96-104. AAAI Press, (2015)Confidence Backup Updates for Aggregating MDP State Values in Monte-Carlo Tree Search., , , and . SOCS, page 156-160. AAAI Press, (2015)Analysis of Attack Graph Representations for Ranking Vulnerability Fixes., , , , and . GCAI, volume 55 of EPiC Series in Computing, page 215-228. EasyChair, (2018)Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback., , and . CoRR, (2020)The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case., , , and . EuroS&P Workshops, page 99-103. IEEE, (2017)Predictive web automation assistant for people with vision impairments., , , and . WWW, page 1031-1040. International World Wide Web Conferences Steering Committee / ACM, (2013)Application Marketplace Malware Detection by User Feedback Analysis., , , , and . ICISSP (Revised Selected Papers), volume 867 of Communications in Computer and Information Science, page 1-19. Springer, (2017)Deployment of DNIDS in Social Networks., , and . ISI, page 59-65. IEEE, (2007)