Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conjunctive Query Inseparability of OWL 2 QL TBoxes., , , , , and . AAAI, AAAI Press, (2011)Evaluation of diverse classification approaches for land use/cover mapping in a Mediterranean region utilizing Hyperion data., , , and . Int. J. Digital Earth, 7 (3): 194-216 (2014)Topomap: Topological Mapping and Navigation Based on Visual SLAM Maps., , , , and . ICRA, page 1-9. IEEE, (2018)Decomposition and Modular Structure of BioPortal Ontologies., , , , , , and . International Semantic Web Conference (1), volume 7031 of Lecture Notes in Computer Science, page 130-145. Springer, (2011)Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting., , , , , , and . ICL-GNSS, page 1-6. IEEE, (2018)Bringing Zero-Knowledge Proofs of Knowledge to Practice., , , , , and . Security Protocols Workshop, volume 7028 of Lecture Notes in Computer Science, page 51-62. Springer, (2009)Improved Garbled Circuit: Free XOR Gates and Applications., and . ICALP (2), volume 5126 of Lecture Notes in Computer Science, page 486-498. Springer, (2008)Conservative Extensions in Guarded and Two-Variable Fragments., , , , and . ICALP, volume 80 of LIPIcs, page 108:1-108:14. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2017)More Efficient Universal Circuit Constructions., , and . ASIACRYPT (2), volume 10625 of Lecture Notes in Computer Science, page 443-470. Springer, (2017)SIXPACK: Securing Internet eXchange Points Against Curious onlooKers., , , , and . CoNEXT, page 120-133. ACM, (2017)