From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints., , и . AAAI, стр. 808-813. AAAI Press / The MIT Press, (2004)Reasoning about Secure Interoperation Using Soft Constraints., , и . Formal Aspects in Security and Trust, том 173 из IFIP, стр. 173-186. Springer, (2004)Soft constraint propagation and solving in CHRs., , и . SAC, стр. 1-5. ACM, (2002)Modeling and detecting the cascade vulnerability problem using soft constraints., , и . SAC, стр. 383-390. ACM, (2004)Towards a similarity-based web service discovery through soft constraint satisfaction problems., , , и . SSW@VLDB, стр. 2. ACM, (2012)Computer Algebra for Fingerprint Matching., , и . International Conference on Computational Science, том 2657 из Lecture Notes in Computer Science, стр. 811-820. Springer, (2003)A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily., , и . ATC, том 5060 из Lecture Notes in Computer Science, стр. 481-495. Springer, (2008)Special issue of the Knowledge Representation and Reasoning Track, Symposium on Applied Computing (SAC) 2017., , и . Fundam. Informaticae, 166 (2): 139-140 (2019)A Comparative Test on the Enumeration of Extensions in Abstract Argumentation., , и . Fundam. Informaticae, 140 (3-4): 263-278 (2015)Unicast and multicast QoS routing with soft-constraint logic programming., , , и . ACM Trans. Comput. Log., 12 (1): 5:1-5:48 (2010)