Author of the publication

Experimenting with the Instances of the MaxSAT Evaluation.

, , , and . CCIA, volume 232 of Frontiers in Artificial Intelligence and Applications, page 31-40. IOS Press, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blacklist muti-objective genetic algorithm for energy saving in heterogeneous environments., , , and . The Journal of Supercomputing, 73 (1): 354-369 (2017)Exploiting Unit Propagation to Compute Lower Bounds in Branch and Bound Max-SAT Solvers., , and . CP, volume 3709 of Lecture Notes in Computer Science, page 403-414. Springer, (2005)An End-to-End Deep Learning Architecture for Classification of Malware's Binary Content., , and . ICANN (3), volume 11141 of Lecture Notes in Computer Science, page 383-391. Springer, (2018)New Inference Rules for Max-SAT., , and . J. Artif. Intell. Res., (2007)Using convolutional neural networks for classification of malware represented as images., , , and . J. Computer Virology and Hacking Techniques, 15 (1): 15-28 (2019)Algorithms for Maximum Satisfiability using Unsatisfiable Cores., and . DATE, page 408-413. ACM, (2008)Weighted argumentation for analysis of discussions in Twitter., , , , , and . Int. J. Approx. Reasoning, (2017)Enhancing the insertion of NOP instructions to obfuscate malware via deep reinforcement learning., , , , and . Comput. Secur., (2022)Multi-criteria genetic algorithm applied to scheduling in multi-cluster environments Open., , , and . J. Simulation, 9 (4): 287-295 (2015)Maximal falsifiability., , , and . AI Commun., 29 (2): 351-370 (2016)