Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outlier detection and evaluation by network flow., and . ICMLA, page 436-442. IEEE Computer Society, (2004)On the complexity of a family of generalized matching problems., and . Discret. Appl. Math., 12 (3): 303-318 (1985)Polar Spaces Having Some Line of Cardinality Two., and . J. Comb. Theory, Ser. A, 33 (2): 223-228 (1982)A Characterization of 3-nets.. J. Comb. Theory, Ser. A, 27 (3): 223-253 (1979)Multithreshold graphs., and . J. Graph Theory, 94 (4): 518-530 (2020)Incrementally Inferring Context-Free Grammars for Domain-Specific Languages., , , and . SEKE, page 363-368. (2006)Tying Ethics to Teamwork Training in a Minimodule., and . CSERC, page 120-122. ACM, (2019)Unsupervised Grammar Inference Using the Minimum Description Length Principle., , and . MLDM, volume 7376 of Lecture Notes in Computer Science, page 141-153. Springer, (2012)Grammar Inference Technology Applications in Software Engineering., , , , , and . ICGI, volume 6339 of Lecture Notes in Computer Science, page 276-279. Springer, (2010)JRV: an interactive tool for data mining visualization., , and . ACM Southeast Regional Conference, page 442-447. ACM, (2004)