From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Topological-Based Method for Allocating Sensors by Using CSP Techniques., , , и . CAEPIA, том 4177 из Lecture Notes in Computer Science, стр. 62-68. Springer, (2005)Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets., , и . ARES, стр. 229-236. IEEE Computer Society, (2008)A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets., , и . SECRYPT, стр. 430-441. INSTICC Press, (2008)Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets., , , и . SECURWARE, стр. 53-61. IEEE Computer Society, (2008)CSP-Based Firewall Rule Set Diagnosis using Security Policies., , и . ARES, стр. 723-729. IEEE Computer Society, (2007)AFPL, an Abstract Language Model for Firewall ACLs., , и . ICCSA (2), том 5073 из Lecture Notes in Computer Science, стр. 468-483. Springer, (2008)Constraint satisfaction techniques for diagnosing errors in design by contract software., , и . SAVCBS@ESEC/FSE, стр. 11. ACM, (2005)Arquitectura de un Crawler para Extraer las Estrcturas y Contenidos de Recursos Electrónicos., , , и . JISBD, стр. 259-269. (2002)Determination of Possible Minimal Conflict Sets Using Constraint Databases Technology and Clustering., , , и . IBERAMIA, том 3315 из Lecture Notes in Computer Science, стр. 942-952. Springer, (2004)Firewall Rule Set Inconsistency Characterization by Clustering., , и . WOSIS, стр. 138-144. INSTICC Press, (2008)