Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iterative-Deepening Conflict-Based Search., , , , , , and . IJCAI, page 4084-4090. ijcai.org, (2020)Scheduled for July 2020, Yokohama, Japan, postponed due to the Corona pandemic..Eliminating Negation from Normal Logic Programs., and . ALP, volume 463 of Lecture Notes in Computer Science, page 217-231. Springer, (1990)Checking modes of HAL programs., , , , and . Theory Pract. Log. Program., 5 (6): 623-668 (2005)Exact Approaches to the Multi-agent Collective Construction Problem., , , and . CP, volume 12333 of Lecture Notes in Computer Science, page 743-758. Springer, (2020)The Argmax Constraint., and . CP, volume 12333 of Lecture Notes in Computer Science, page 323-337. Springer, (2020)Generalized Modularity for Community Detection., , , , and . ECML/PKDD (2), volume 9285 of Lecture Notes in Computer Science, page 655-670. Springer, (2015)Fragment-Based Planning Using Column Generation., , , and . ICAPS, AAAI, (2014)Solving Set Constraint Satisfaction Problems using ROBDDs., , and . J. Artif. Intell. Res., (2005)Herbrand Constraints in HAL., , , , , and . Program Development in Computational Logic, volume 3049 of Lecture Notes in Computer Science, Springer, (2004)Flexible access control policy specification with constraint logic programming., and . ACM Trans. Inf. Syst. Secur., 6 (4): 501-546 (2003)