Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Centrality-Based Improvements to CDCL Heuristics., and . SAT, volume 10929 of Lecture Notes in Computer Science, page 122-131. Springer, (2018)MAX-SAT problem using evolutionary algorithms., , and . SIS, page 105-112. IEEE, (2014)A Component Approach to Embedding Awareness and Conversation.. WETICE, page 82-89. IEEE Computer Society, (1998)Resolution and Clause Learning for Multi-Valued CNF Formulas.. PRUV, volume 1205 of CEUR Workshop Proceedings, page 141-154. CEUR-WS.org, (2014)Control without bureaucracy. McGraw-Hill, London u.a., (1979)Guarded Constraint Models Define Treewidth Preserving Reductions.. CP, volume 11802 of Lecture Notes in Computer Science, page 350-365. Springer, (2019)The Notification Service Transfer Protocol (NSTP): Infrastructure for Synchronous Groupware., , and . Comput. Networks, 29 (8-13): 905-915 (1997)Simplifying CDCL Clause Database Reduction., and . SAT, volume 11628 of Lecture Notes in Computer Science, page 183-192. Springer, (2019)Podcasting by synchronising PowerPoint and voice: What are the pedagogical benefits?, , and . Comput. Educ., 53 (2): 532--539 (2009)How effective is perceptual training? Evaluating two perceptual training methods on a difficult visual categorisation task., , , , , , , , and . CogSci, cognitivesciencesociety.org, (2021)