From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

RPO Constraint Solving Is in NP., , и . CSL, том 1584 из Lecture Notes in Computer Science, стр. 385-398. Springer, (1998)Machine Learning Methods for Software Vulnerability Detection., и . IWSPA@CODASPY, стр. 31-39. ACM, (2018)Combining Syntax and Semantics for Automatic Extractive Single-Document Summarization., и . CICLing (2), том 7182 из Lecture Notes in Computer Science, стр. 366-377. Springer, (2012)Mining the Web for Collocations: IR Models of Term Associations., , , , , , и . CICLing (1), том 9623 из Lecture Notes in Computer Science, стр. 177-194. Springer, (2016)Can Machines Tell Stories? A Comparative Study of Deep Neural Language Models and Metrics., и . IEEE Access, (2020)Software Vulnerability Detection via Multimodal Deep Learning., и . STM, том 13867 из Lecture Notes in Computer Science, стр. 85-103. Springer, (2022)A visual and interactive automata theory course emphasizing breadth of automata.. ITiCSE, стр. 325-329. ACM, (2005)University of Houston @ CL-SciSumm 2017: Positional language Models, Structural Correspondence Learning and Textual Entailment., , , и . BIRNDL@SIGIR (2), том 2002 из CEUR Workshop Proceedings, стр. 73-85. CEUR-WS.org, (2017)Vulnerability Detection via Multimodal Learning: Datasets and Analysis., и . AsiaCCS, стр. 1225-1227. ACM, (2022)On the Structure of Counterexamples to Symmetric Orderings for BDD's., и . CATS, том 61 из Electronic Notes in Theoretical Computer Science, стр. 84-100. Elsevier, (2002)