Author of the publication

Clustering Formulation Using Constraint Optimization.

, , , , and . SEFM Workshops, volume 9509 of Lecture Notes in Computer Science, page 93-107. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrity Constraints Evolution in Deductive Databases., and . GULP-PRODE, page 160-168. (1995)Magma2: A Language Oriented toward Experiments in Control.. ACM Trans. Program. Lang. Syst., 6 (4): 468-486 (1984)k-NN as an implementation of situation testing for discrimination discovery and prevention., , and . KDD, page 502-510. ACM, (2011)Enhancing GISs for spatio-temporal reasoning., , and . ACM-GIS, page 42-48. ACM, (2002)What Else Can Be Extracted from Ontologies? Influence Rules., and . ICSOFT (Selected Papers), volume 303 of Communications in Computer and Information Science, page 270-285. Springer, (2011)Mining Influence Rules out of Ontologies., and . ICSOFT (2), page 323-333. SciTePress, (2011)Universal Quantification by Case Analysis., , , and . ECAI, page 111-116. (1990)Knowledge Mining and Discovery for Searching in Literary Texts., , , , , , and . LREC, European Language Resources Association, (2002)MuTACLP: A Language for Declarative GIS Analysis., , , and . Computational Logic, volume 1861 of Lecture Notes in Computer Science, page 1002-1016. Springer, (2000)Composing General Logic Programs., , and . LPNMR, volume 1265 of Lecture Notes in Computer Science, page 274-289. Springer, (1997)