| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2020 | — | conf |
HotSoS
|
| 2020 | J | jnl |
CoRR
|
| 2018 | J | jnl |
Entropy
|
| 2016 | J | jnl |
J. Symb. Comput.
|
| 2015 | B | conf |
ISSAC
|
| 2015 | B | conf |
ISSAC
|
| 2015 | J | jnl |
CoRR
|
| 2014 | J | jnl |
ACM Commun. Comput. Algebra
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
CoRR
|
| 2014 | B | conf |
ISSAC
|
| 2014 | J | jnl |
CoRR
|
| 2014 | B | conf |
ISSAC
|
| 2013 | B | conf |
ISSAC
|
| 2013 | B | conf |
CASC
|
| 2013 | J | jnl |
CoRR
|
| 2013 | J | jnl |
ACM Commun. Comput. Algebra
|
| 2012 | J | jnl |
CoRR
|
| 2011 | J | jnl |
Math. Comput.
|
| 2010 | J | jnl |
ACM Commun. Comput. Algebra
|
| 2010 | — | conf |
PASCO
|
| 2010 | J | jnl |
J. Web Semant.
|
| 2009 | A | conf |
ICWSM
|
| 2009 | — | conf |
WASA
|
| 2008 | J | jnl |
ACM Commun. Comput. Algebra
|
| 2008 | A | conf |
CIKM
|
| 2008 | A* | conf |
SIGIR
|
| 2008 | — | conf |
BioLINK@ISMB/ECCB
|
| 2007 | A* | conf |
KDD
|
| 2004 | J | jnl |
AI Mag.
|
| 2002 | — | ch. |
Applications of Data Mining in Computer Security
|