Search

Your search keyword '"Lisitsa, Alexei"' showing total 453 results

Search Constraints

Start Over You searched for: Author "Lisitsa, Alexei" Remove constraint Author: "Lisitsa, Alexei"
453 results on '"Lisitsa, Alexei"'

Search Results

1. Contextual Transformers for Goal-Oriented Reinforcement Learning

3. Automated reasoning for proving non-orderability of groups

4. Handling of Past and Future with Phenesthe+

6. Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams

7. Machine learning discovers invariants of braids and flat braids

8. On Strong Anti-learning of Parity

9. Process Mining Algorithm for Online Intrusion Detection System

10. Describing realizable Gauss diagrams using the concepts of parity or bipartate graphs

11. Data Querying with Ciphertext Policy Attribute Based Encryption

12. Can process mining help in anomaly-based intrusion detection?

13. An application of neural networks to a problem in knot theory and group theory (untangling braids)

14. Process Mining Algorithm for Online Intrusion Detection System

15. Logic Rules Meet Deep Learning: A Novel Approach for Ship Type Classification

16. Untangling Braids with Multi-agent Q-Learning

17. Proceedings of the 9th International Workshop on Verification and Program Transformation

18. Representation and Processing of Instantaneous and Durative Temporal Phenomena

19. Circle graphs (chord interlacement graphs) of Gauss diagrams: Descriptions of realizable Gauss diagrams, algorithms, enumeration

21. Interpreting NMR Spectra by Constraint Solving

22. Zero Update Encryption Adjustment on Encrypted Database Queries

23. Modular Verification of Autonomous Space Robotics

24. Agent-based (BDI) modeling for automation of penetration testing

25. Proceedings Seventh International Workshop on Verification and Program Transformation

28. Representation and Processing of Instantaneous and Durative Temporal Phenomena

29. Cross-Datasets Evaluation of Machine Learning Models for Intrusion Detection Systems

30. Querying Encrypted Data in Graph Databases

31. Verification of Programs via Intermediate Interpretation

32. Proceedings Fifth International Workshop on Verification and Program Transformation

33. Verifying Programs via Intermediate Interpretation

34. Gauss-Lintel, an Algorithm Suite for Exploring Chord Diagrams

36. Proceedings of the Fourth International Workshop on Verification and Program Transformation

38. Finite Countermodel Based Verification for Program Transformation (A Case Study)

39. Proceedings of the Third International Workshop on Verification and Program Transformation

40. A combinatorial approach to knot recognition

42. Analysing Security Protocols Using Scenario Based Simulation

43. Investigating the Capability of Agile Processes to Support Medical Devices Regulations: The Case of XP, Scrum, and FDD with EU MDR Regulations

44. Detecting unknots via equational reasoning, I: Exploration

45. Computer-Aided Proof of Erdos Discrepancy Properties

46. A SAT Attack on the Erdos Discrepancy Conjecture

47. Practical Verification of Decision-Making in Agent-Based Autonomous Systems

48. Visual Algebraic Proofs for Unknot Detection

49. Clarification of Ambiguity for the Simple Authentication and Security Layer

50. Revisiting MU-Puzzle. A Case Study in Finite Countermodels Verification

Catalog

Books, media, physical & digital resources