Current path analysis for electrostatic discharge protection
Proceedings of the 2006 IEEE/ACM international conference on Computer-aided design
Covering Arrays Avoiding Forbidden Edges
COCOA 2008 Proceedings of the 2nd international conference on Combinatorial Optimization and Applications
Securing information flow via dynamic capture of dependencies
Journal of Computer Security - 20th IEEE Computer Security Foundations Symposium (CSF)
Covering arrays avoiding forbidden edges
Theoretical Computer Science
Minimal ordering constraints for some families of variable symmetries
Annals of Mathematics and Artificial Intelligence
COCOA'10 Proceedings of the 4th international conference on Combinatorial optimization and applications - Volume Part I
On Computing Deltas of RDF/S Knowledge Bases
ACM Transactions on the Web (TWEB)
Practical RDF schema reasoning with annotated semantic web data
ISWC'11 Proceedings of the 10th international conference on The semantic web - Volume Part I
Repairing inconsistent dimensions in data warehouses
Data & Knowledge Engineering
On efficient processing of BPMN-Q queries
Computers in Industry
Hi-index | 0.00 |