Author of the publication

Contingent versus Deterministic Plans in Multi-Modal Journey Planning.

, and . ICAPS, page 268-272. AAAI Press, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SWAT: Social Web Application for Team Recommendation., , , and . ICPADS, page 845-850. IEEE Computer Society, (2012)Computing Multi-Modal Journey Plans under Uncertainty., , , , , and . J. Artif. Intell. Res., (2019)S&P360: Multidimensional Perspective on Companies from Online Data Sources., , , , , , , and . ECML/PKDD (3), volume 9286 of Lecture Notes in Computer Science, page 320-324. Springer, (2015)Secure and Policy-Private Resource Sharing in an Online Social Network., , , and . SocialCom/PASSAT, page 872-875. IEEE Computer Society, (2011)Identity-based long running negotiations., , , and . Digital Identity Management, page 97-106. ACM, (2008)Contingent versus Deterministic Plans in Multi-Modal Journey Planning., and . ICAPS, page 268-272. AAAI Press, (2015)FPVI: A scalable method for discovering privacy vulnerabilities in microdata., , and . ISC2, page 1-8. IEEE, (2016)Answering queries using pairings., , and . CoRR, (2014)The Bounded Laplace Mechanism in Differential Privacy., , , and . CoRR, (2018)AnonTokens: tracing re-identification attacks through decoy records., , , and . CoRR, (2019)