Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tradeoffs in the Complexity of Backdoor Detection., , and . CP, volume 4741 of Lecture Notes in Computer Science, page 256-270. Springer, (2007)The Expressive Power of Transformers with Chain of Thought., and . CoRR, (2023)Leveraging Code to Improve In-context Learning for Semantic Parsing., , , and . CoRR, (2023)New filtering algorithms for combinations of among constraints., , , and . Constraints An Int. J., 14 (2): 273-292 (2009)Leveraging Belief Propagation, Backtrack Search, and Statistics for Model Counting., , and . ISAIM, (2008)Adaptive Stratified Sampling for Precision-Recall Estimation., and . UAI, page 825-834. AUAI Press, (2018)Low-density Parity Constraints for Hashing-Based Discrete Integration., , , and . ICML, volume 32 of JMLR Workshop and Conference Proceedings, page 271-279. JMLR.org, (2014)Learning Back-Clauses in SAT - (Poster Presentation)., , and . SAT, volume 7317 of Lecture Notes in Computer Science, page 498-499. Springer, (2012)Filtering Atmost1 on Pairs of Set Variables., and . CPAIOR, volume 5015 of Lecture Notes in Computer Science, page 382-386. Springer, (2008)QBF Modeling: Exploiting Player Symmetry for Simplicity and Efficiency., , , , and . SAT, volume 4121 of Lecture Notes in Computer Science, page 382-395. Springer, (2006)