Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature Construction during Tree Learning., , and . GWAI, volume 285 of Informatik-Fachberichte, page 50-61. Springer, (1991)What Happened with AI's Drosophila?. ÖGAI, volume 106 of Informatik-Fachberichte, page 194-203. Springer, (1985)Automated WIMP-UI behavior generation: Parallelism and granularity of communication units., , , and . SMC, page 2816-2821. IEEE, (2011)Verification of Business Processes Against Business Rules Using Object Life Cycles., , , and . WorldCIST (1), volume 444 of Advances in Intelligent Systems and Computing, page 589-598. Springer, (2016)Model transformation rules for customization of multi-device graphical user interfaces., , and . EICS, page 100-109. ACM, (2015)A case study of systematic top-down design of cyber-physical models with integrated validation and formal verification., and . SAC, page 1828-1836. ACM, (2019)Gradual transition towards autonomic software systems based on high-level communication specification., , , , and . SAC, page 84-89. ACM, (2007)Back-up of Heuristic Values: Minimaxing vs. Product Propagation., and . ECAI, page 665-669. John Wiley and Sons, (1998)Switching from Bidirectional to Unidirectional Search., , , , and . IJCAI, page 1178-1183. Morgan Kaufmann, (1999)Using Aspiration Windows for Minimax Algorithms., , and . IJCAI, page 192-197. Morgan Kaufmann, (1991)