Author of the publication

Claim Detection in Judgments of the EU Court of Justice.

, , , , and . AICOL, volume 10791 of Lecture Notes in Computer Science, page 513-527. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelling last-act attempted crime in criminal law., , , and . J. Appl. Non Class. Logics, 29 (4): 327-357 (2019)Good faith in contract negotiation and performance., , and . Int. J. Bus. Process. Integr. Manag., 4 (3): 154-173 (2009)A STIT logic analysis of social influence., and . AAMAS, page 885-892. IFAAMAS/ACM, (2014)Theory based explanation of case law domains., and . ICAIL, page 12-21. ACM, (2001)The Structure of Norm Conditions and Nonmonotonic Reasoning in Law.. ICAIL, page 155-164. ACM, (1991)Editorial message: special track on computer-aided law and advanced technologies., and . SAC, page 306-307. ACM, (2006)Privacy, Reputation, and Trust: Some Implications for Data Protection.. iTrust, volume 3986 of Lecture Notes in Computer Science, page 354-366. Springer, (2006)CLAUDETTE: an automated detector of potentially unfair clauses in online terms of service., , , , , , and . Artif. Intell. Law, 27 (2): 117-139 (2019)A Ceteris Paribus Deontic Logic., , and . CILC, volume 2710 of CEUR Workshop Proceedings, page 248-262. CEUR-WS.org, (2020)GDPR Privacy Policies in CLAUDETTE: Challenges of Omission, Context and Multilingualism., , , , , , , , and . ASAIL@ICAIL, volume 2385 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)