Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kalman-like Filtering in a possibilistic Setting., , and . ECAI, page 8-12. IOS Press, (2000)Modeling positive and negative information in possibility theory., , , and . Int. J. Intell. Syst., 23 (10): 1094-1118 (2008)A Polynomial Algorithm for Merging Lightweight Ontologies in Possibility Theory Under Incommensurability Assumption., , , , and . ICAART (2), page 415-422. SciTePress, (2017)An Alternative Inference for Qualitative Choice Logic., , and . ECAI, volume 141 of Frontiers in Artificial Intelligence and Applications, page 741-742. IOS Press, (2006)Editorial introduction to the special issue.. Ann. Math. Artif. Intell., 69 (1): 1-2 (2013)Alert Correlation based on a Logical Handling of Administrator Preferences and Knowledge., and . SECRYPT, page 50-56. INSTICC Press, (2008)Merging Possibilistic Networks.. ECAI, volume 141 of Frontiers in Artificial Intelligence and Applications, page 332-336. IOS Press, (2006)Interval-Based Possibilistic Networks., , and . SUM, volume 8720 of Lecture Notes in Computer Science, page 37-50. Springer, (2014)Possibilistic DL-Lite., and . SUM, volume 8078 of Lecture Notes in Computer Science, page 346-359. Springer, (2013)Enhanced Correlation in an Intrusion Detection Process., , and . MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 157-170. Springer, (2003)