Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating synthetic positive and negative business process traces through abduction., , , and . Knowl. Inf. Syst., 62 (2): 813-839 (2020)From Eager to Lazy Constrained Data Acquisition: A General Framework., , , , , and . New Generation Comput., 19 (4): 339-368 (2001)Exploiting Symbolic Learning in Visual Inspection., , , and . IDA, volume 1280 of Lecture Notes in Computer Science, page 223-234. Springer, (1997)Artificial Intelligence Techniques for Monitoring Dangerous Infections., , , , , and . IEEE Trans. Information Technology in Biomedicine, 10 (1): 143-155 (2006)Parametric Composable Modules in a Logic Programming Language., , and . Comput. Lang., 18 (2): 105-123 (1993)A CHR-based implementation of known arc-consistency., , , , and . Theory Pract. Log. Program., 5 (4-5): 419-440 (2005)An Abstract Interpretation Framework for Optimizing Dynamic Modular Logic Languages., , and . Inf. Process. Lett., 58 (4): 163-170 (1996)Improving the Efficiency of Dynamic Modular Logic Languages., , and . GULP-PRODE, page 347-358. (1995)A CHR-based Implementation of Known Arc-Consistency, , , , and . CoRR, (2004)Reasoning on Constraints in Constraint Logic Programming., , and . ICLP, page 413. MIT Press, (1997)