453 results on '"Lisitsa, Alexei"'
Search Results
2. Semigroups, keis and groups induced by knot diagrams: an experimental investigation with automated reasoning
3. Automated reasoning for proving non-orderability of groups
4. Handling of Past and Future with Phenesthe+
5. Machine Learning Discovers Invariants of Braids and Flat Braids
6. Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams
7. Machine learning discovers invariants of braids and flat braids
8. On Strong Anti-learning of Parity
9. Process Mining Algorithm for Online Intrusion Detection System
10. Describing realizable Gauss diagrams using the concepts of parity or bipartate graphs
11. Data Querying with Ciphertext Policy Attribute Based Encryption
12. Can process mining help in anomaly-based intrusion detection?
13. An application of neural networks to a problem in knot theory and group theory (untangling braids)
14. Process Mining Algorithm for Online Intrusion Detection System
15. Logic Rules Meet Deep Learning: A Novel Approach for Ship Type Classification
16. Untangling Braids with Multi-agent Q-Learning
17. Proceedings of the 9th International Workshop on Verification and Program Transformation
18. Representation and Processing of Instantaneous and Durative Temporal Phenomena
19. Circle graphs (chord interlacement graphs) of Gauss diagrams: Descriptions of realizable Gauss diagrams, algorithms, enumeration
20. Deep Reinforcement Learning for Continuous Control of Material Thickness
21. Interpreting NMR Spectra by Constraint Solving
22. Zero Update Encryption Adjustment on Encrypted Database Queries
23. Modular Verification of Autonomous Space Robotics
24. Agent-based (BDI) modeling for automation of penetration testing
25. Proceedings Seventh International Workshop on Verification and Program Transformation
26. Interpreting NMR Spectra by Constraint Solving
27. Deep Reinforcement Learning for Continuous Control of Material Thickness
28. Representation and Processing of Instantaneous and Durative Temporal Phenomena
29. Cross-Datasets Evaluation of Machine Learning Models for Intrusion Detection Systems
30. Querying Encrypted Data in Graph Databases
31. Verification of Programs via Intermediate Interpretation
32. Proceedings Fifth International Workshop on Verification and Program Transformation
33. Verifying Programs via Intermediate Interpretation
34. Gauss-Lintel, an Algorithm Suite for Exploring Chord Diagrams
35. Fine-Grained Access Control for Querying Over Encrypted Document-Oriented Database
36. Proceedings of the Fourth International Workshop on Verification and Program Transformation
37. Representation and Processing of Instantaneous and Durative Temporal Phenomena
38. Finite Countermodel Based Verification for Program Transformation (A Case Study)
39. Proceedings of the Third International Workshop on Verification and Program Transformation
40. A combinatorial approach to knot recognition
41. Cross-Datasets Evaluation of Machine Learning Models for Intrusion Detection Systems
42. Analysing Security Protocols Using Scenario Based Simulation
43. Investigating the Capability of Agile Processes to Support Medical Devices Regulations: The Case of XP, Scrum, and FDD with EU MDR Regulations
44. Detecting unknots via equational reasoning, I: Exploration
45. Computer-Aided Proof of Erdos Discrepancy Properties
46. A SAT Attack on the Erdos Discrepancy Conjecture
47. Practical Verification of Decision-Making in Agent-Based Autonomous Systems
48. Visual Algebraic Proofs for Unknot Detection
49. Clarification of Ambiguity for the Simple Authentication and Security Layer
50. Revisiting MU-Puzzle. A Case Study in Finite Countermodels Verification
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.