Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preferring diagnoses by abduction., , and . IEEE Trans. Syst. Man Cybern., 23 (3): 792-808 (1993)An Event-B based approach for cloud composite services verification., , , and . Formal Aspects Comput., 32 (4-6): 361-393 (2020)Towards Systematic Contruction of Diagnostic Systems for Large Industrial Plants: Methods, Languages, and Tools.. IEEE Trans. Knowl. Data Eng., 6 (5): 698-712 (1994)Survey of the Adequate Descriptor for Content-Based Image Retrieval on the Web: Global versus Local Features., , and . CORIA, page 445-456. LSIS-USTV, (2009)Operative Diagnosis Algorithms for Single-Fault in Graph-Based Systems., , and . IEA/AIE, volume 1821 of Lecture Notes in Computer Science, page 192-197. Springer, (2000)Image Segmentation Based on Adaptive Fuzzy-C-Means Clustering., , and . ICPR, page 2306-2309. IEEE Computer Society, (2010)A flexible formal framework for masking/demasking faults., and . Inf. Sci., 159 (1-2): 29-52 (2004)The DLR-ORECOP Real-time Replication Control Protocol., , , and . ETFA, page 1-8. IEEE, (2009)Building Customer Models from Business Data: an Automatic Approach Based on Fuzzy Clustering and Machine Learning., , and . International Journal of Computational Intelligence and Applications, 8 (4): 445-465 (2009)A distributed simulation based monitoring., and . FTDCS, page 72-77. IEEE Computer Society, (1997)