Author of the publication

Observant: An Annotated Term-Rewriting System for Deciding Observation Congruence.

, , and . ECAI, page 393-397. John Wiley and Sons, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DNS-ADVP: A Machine Learning Anomaly Detection and Visual Platform to Protect Top-Level Domain Name Servers Against DDoS Attacks., , , , , and . IEEE Access, (2019)Some Encounters on the Productive Use of a Failed Proof Attempt or a Counterexample.. MICAI (1), volume 6437 of Lecture Notes in Computer Science, page 1-12. Springer, (2010)Bagging-RandomMiner: a one-class classifier for file access-based masquerade detection., , , , , and . Mach. Vis. Appl., 30 (5): 959-974 (2019)Evader surveillance under incomplete information., , and . ICRA, page 5511-5518. IEEE, (2010)Stacking Fingerprint Matching Algorithms for Latent Fingerprint Identification., , and . CIARP, volume 11896 of Lecture Notes in Computer Science, page 230-240. Springer, (2019)COARSE-EMOA: An indicator-based evolutionary algorithm for solving equality constrained multi-objective optimization problems., , , and . Swarm Evol. Comput., (2021)A Practical Tutorial for Decision Tree Induction: Evaluation Measures for Candidate Splits and Opportunities., , , , and . ACM Comput. Surv., 54 (1): 18:1-18:38 (2022)On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks., , , and . Sensors, 15 (4): 7619-7649 (2015)On the Phase Transition of Finding a Biclique in a larger Bipartite Graph., , and . CoRR, (2016)Editorial.. Computación y Sistemas, (2012)