Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When Nonmonotonicity Comes from Distances., and . KI, volume 861 of Lecture Notes in Computer Science, page 308-318. Springer, (1994)The Computational Complexity of Dominance and Consistency in CP-Nets., , , and . CoRR, (2014)A Constraint Satisfaction Approach to Decision under Uncertainty, , , and . CoRR, (2013)Linking Transition-based Update and Base Revision., and . ECSQARU, volume 946 of Lecture Notes in Computer Science, page 133-142. Springer, (1995)Twenty-Five Years of Preferred Subtheories.. Advances in Knowledge Representation, Logic Programming, and Abstract Argumentation, volume 9060 of Lecture Notes in Computer Science, page 157-172. Springer, (2015)From knowledge-based programs to graded belief-based programs, part II: off-line reasoning., and . IJCAI, page 497-502. Professional Book Center, (2005)Incentive Engineering for Boolean Games., , , and . IJCAI, page 2602-2607. IJCAI/AAAI, (2011)How Hard Is It to Control Sequential Elections via the Agenda?, , and . IJCAI, page 103-108. (2009)Compiling the Votes of a Subelectorate., , , and . IJCAI, page 97-102. (2009)Some Representation and Computational Issues in Social Choice.. ECSQARU, volume 3571 of Lecture Notes in Computer Science, page 15-26. Springer, (2005)