default search action
Alexei Lisitsa 0001
Person information
- affiliation: University of Liverpool, Department of Computer Science, UK
- affiliation (PhD 1997): Russian Academy of Science, Program Systems Institute, Pereslavl-Zalessky, Russia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c85]Nouf Al-Juaid, Alexei Lisitsa, Sven Schewe:
Efficient and Secure Multiparty Querying over Federated Graph Databases. DATA 2024: 39-50 - [c84]Andrew Fish, Alexei Lisitsa:
Automated Reasoning with Tangles: towards Quantum Verification Applications. LPAR Complementary Volume 2024: 69-80 - [c83]Alexei Lisitsa:
Towards computer-assisted proofs of parametric Andrews-Curtis simplifications, II. LPAR Complementary Volume 2024: 131-136 - [c82]Jia Liu, Wenjun Fan, Yifan Dai, Eng Gee Lim, Alexei Lisitsa:
A Lightweight and Responsive On-Line IDS Towards Intelligent Connected Vehicles System. SAFECOMP 2024: 184-199 - [c81]Nouf Al-Juaid, Alexei Lisitsa, Sven Schewe:
Secure Multi-Party Traversal Queries over Federated Graph Databases. SECRYPT 2024: 716-721 - 2023
- [c80]Alexei Lisitsa, Mateo Salles, Alexei Vernitski:
Supervised Learning for Untangling Braids. ICAART (3) 2023: 784-789 - [c79]Hadeel Saad Alghamdi, Alexei Lisitsa, Igor Barsukov, Rudi Grosman:
Detecting 2D NMR Signals Using Mask RCNN. ICAART (3) 2023: 940-947 - [c78]Nouf Al-Juaid, Alexei Lisitsa, Sven Schewe:
Secure Joint Querying Over Federated Graph Databases Utilising SMPC Protocols. ICISSP 2023: 210-217 - [c77]Yinzheng Zhong, Alexei Lisitsa:
Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams. ICISSP 2023: 576-582 - [c76]Alexei Lisitsa, Alexei Vernitski:
On Strong Anti-learning of Parity. OL2A (2) 2023: 271-279 - [c75]Oliver Dippel, Alexei Lisitsa, Bei Peng:
Deep Reinforcement Learning for Continuous Control of Material Thickness. SGAI Conf. 2023: 321-334 - [c74]Haneen A. Alharbi, Igor Barsukov, Rudi Grosman, Alexei Lisitsa:
Interpreting NMR Spectra by Constraint Solving. SGAI Conf. 2023: 465-478 - [c73]Manolis Pitsikalis, Alexei Lisitsa, Patrick Totzke:
Handling of Past and Future with Phenesthe+. GandALF 2023: 33-49 - [i28]Alexei Lisitsa, Mateo Salles, Alexei Vernitski:
Machine learning discovers invariants of braids and flat braids. CoRR abs/2307.12185 (2023) - [i27]Yinzheng Zhong, Alexei Lisitsa:
Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams. CoRR abs/2308.10893 (2023) - 2022
- [j19]Georgios Kourtis, Clare Dixon, Michael Fisher, Alexei Lisitsa:
Correction: Parameterized verification of leader/follower systems via first-order temporal logic. Formal Methods Syst. Des. 60(2): 325-326 (2022) - [c72]Abdullah Khan, Alexei Vernitski, Alexei Lisitsa:
Reinforcement learning algorithms for the Untangling of Braids. FLAIRS 2022 - [c71]Haneen A. Alharbi, Igor Barsukov, Rudi Grosman, Alexei Lisitsa:
Molecular Fragments from Incomplete, Real-life NMR Data: Framework for Spectra Analysis with Constraint Solvers. ICAART (3) 2022: 834-841 - [c70]Abdullah Khan, Alexei Lisitsa, Alexei Vernitski:
Training AI to Recognize Realizable Gauss Diagrams: The Same Instances Confound AI and Human Mathematicians. ICAART (3) 2022: 990-995 - [c69]Maryam Almarwani, Boris Konev, Alexei Lisitsa:
Zero Update Encryption Adjustment on Encrypted Database Queries. ICISSP (Revised Selected Papers) 2022: 25-47 - [c68]Maryam Almarwani, Boris Konev, Alexei Lisitsa:
Efficient and Secure Encryption Adjustment for JSON Data. ICISSP 2022: 307-313 - [c67]Nouf Al-Juaid, Alexei Lisitsa, Sven Schewe:
SMPG: Secure Multi Party Computation on Graph Databases. ICISSP 2022: 463-471 - [c66]Manolis Pitsikalis, Thanh-Toan Do, Alexei Lisitsa, Shan Luo:
Logic Rules Meet Deep Learning: A Novel Approach for Ship Type Classification (Extended Abstract). IJCAI 2022: 5324-5328 - [c65]Manolis Pitsikalis, Alexei Lisitsa, Patrick Totzke, Simon Lee:
Making Sense of Heterogeneous Maritime Data. MDM 2022: 401-406 - [i26]Yinzheng Zhong, John Yannis Goulermas, Alexei Lisitsa:
Process Mining Algorithm for Online Intrusion Detection System. CoRR abs/2205.12064 (2022) - [i25]Alexei Lisitsa, Mateo Salles, Alexei Vernitski:
An application of neural networks to a problem in knot theory and group theory (untangling braids). CoRR abs/2206.05373 (2022) - [i24]Yinzheng Zhong, Alexei Lisitsa:
Can process mining help in anomaly-based intrusion detection? CoRR abs/2206.10379 (2022) - [i23]Maryam Almarwani, Boris Konev, Alexei Lisitsa:
Data Querying with Ciphertext Policy Attribute Based Encryption. CoRR abs/2209.15103 (2022) - 2021
- [j18]Georgios Kourtis, Clare Dixon, Michael Fisher, Alexei P. Lisitsa:
Parameterized verification of leader/follower systems via first-order temporal logic. Formal Methods Syst. Des. 58(3): 440-468 (2021) - [j17]Michael Fisher, Rafael C. Cardoso, Emily C. Collins, Christopher Dadswell, Louise A. Dennis, Clare Dixon, Marie Farrell, Angelo Ferrando, Xiaowei Huang, Mike Jump, Georgios Kourtis, Alexei Lisitsa, Matt Luckcuck, Shan Luo, Vincent Pagé, Fabio Papacchini, Matt Webster:
An Overview of Verification and Validation Challenges for Inspection Robots. Robotics 10(2): 67 (2021) - [c64]Faisal Alotaibi, Alexei Lisitsa:
Matrix profile for DDoS attacks detection. FedCSIS 2021: 357-361 - [c63]Maryam Almarwani, Boris Konev, Alexei Lisitsa:
Release-aware In-out Encryption Adjustment in MongoDB Query Processing. ICISSP 2021: 714-722 - [c62]Manolis Pitsikalis, Alexei Lisitsa, Shan Luo:
Representation and Processing of Instantaneous and Durative Temporal Phenomena. LOPSTR 2021: 135-156 - [c61]Abdullah Khan, Alexei Lisitsa, Alexei Vernitski:
Gauss-Lintel, an Algorithm Suite for Exploring Chord Diagrams. CICM 2021: 197-202 - [c60]Manolis Pitsikalis, Thanh-Toan Do, Alexei Lisitsa, Shan Luo:
Logic Rules Meet Deep Learning: A Novel Approach for Ship Type Classification. RuleML+RR 2021: 203-217 - [c59]Abdullah Khan, Alexei Vernitski, Alexei Lisitsa:
Untangling Braids with Multi-Agent Q-Learning. SYNASC 2021: 135-139 - [e9]Alexei Lisitsa, Andrei P. Nemytykh:
Proceedings of the 9th International Workshop on Verification and Program Transformation, VPT@ETAPS 2021, Luxembourg, Luxembourg, 27th and 28th of March 2021. EPTCS 341, 2021 [contents] - [i22]Abdullah Khan, Alexei Lisitsa, Alexei Vernitski:
Experimental Mathematics Approach to Gauss Diagrams Realizability. CoRR abs/2103.02102 (2021) - [i21]Abdullah Khan, Alexei Lisitsa, Viktor Lopatkin, Alexei Vernitski:
Circle graphs (chord interlacement graphs) of Gauss diagrams: Descriptions of realizable Gauss diagrams, algorithms, enumeration. CoRR abs/2108.02873 (2021) - [i20]Manolis Pitsikalis, Alexei Lisitsa, Shan Luo:
Representation and Processing of Instantaneous and Durative Temporal Phenomena. CoRR abs/2108.13365 (2021) - [i19]Abdullah Khan, Alexei Vernitski, Alexei Lisitsa:
Untangling Braids with Multi-agent Q-Learning. CoRR abs/2109.14502 (2021) - [i18]Manolis Pitsikalis, Thanh-Toan Do, Alexei Lisitsa, Shan Luo:
Logic Rules Meet Deep Learning: A Novel Approach for Ship Type Classification. CoRR abs/2111.01042 (2021) - 2020
- [c58]Maryam Almarwani, Boris Konev, Alexei Lisitsa:
Release-Aware Encryption Adjustment Query processing for Document Database. ICCBDC 2020: 48-51 - [c57]Ge Chu, Alexei Lisitsa:
Ontology-based Automation of Penetration Testing. ICISSP 2020: 713-720 - [e8]Mohammed I. Khalaf, Dhiya Al-Jumeily, Alexei Lisitsa:
Applied Computing to Support Industry: Innovation and Technology - First International Conference, ACRIT 2019, Ramadi, Iraq, September 15-16, 2019, Revised Selected Papers. Communications in Computer and Information Science 1174, Springer 2020, ISBN 978-3-030-38751-8 [contents]
2010 – 2019
- 2019
- [c56]Nahla Aburawi, Frans Coenen, Alexei Lisitsa:
Querying Encrypted Data in Graph Databases. ACRIT 2019: 367-382 - [c55]Mohmood Alsaadi, Alexei Lisitsa, Malik Qasaimeh:
Minimizing the ambiguities in medical devices regulations based on software requirement engineering techniques. DATA 2019: 18:1-18:5 - [c54]Mohmood Alsaadi, Alexei Lisitsa, Mohammed Khalaf, Malik Qasaimeh:
Investigating the Capability of Agile Processes to Support Medical Devices Regulations: The Case of XP, Scrum, and FDD with EU MDR Regulations. ICIC (3) 2019: 581-592 - [c53]Maryam Almarwani, Boris Konev, Alexei Lisitsa:
Fine-Grained Access Control for Querying Over Encrypted Document-Oriented Database. ICISSP (Revised Selected Papers) 2019: 403-425 - [c52]Maryam Almarwani, Boris Konev, Alexei Lisitsa:
Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database. ICISSP 2019: 606-614 - [c51]Farah Al-Shareefi, Alexei Lisitsa, Clare Dixon:
Analysing Security Protocols Using Scenario Based Simulation. VECoS 2019: 47-62 - [e7]Alexei Lisitsa, Andrei P. Nemytykh:
Proceedings Seventh International Workshop on Verification and Program Transformation, VPT@Programming 2019, Genova, Italy, 2nd April 2019. EPTCS 299, 2019 [contents] - [i17]Ge Chu, Alexei Lisitsa:
Agent-based (BDI) modeling for automation of penetration testing. CoRR abs/1908.06970 (2019) - [i16]Marie Farrell, Rafael C. Cardoso, Louise A. Dennis, Clare Dixon, Michael Fisher, Georgios Kourtis, Alexei Lisitsa, Matt Luckcuck, Matt Webster:
Modular Verification of Autonomous Space Robotics. CoRR abs/1908.10738 (2019) - 2018
- [c50]Farah Al-Shareefi, Alexei Lisitsa, Clare Dixon:
Clarification of Ambiguity for the Simple Authentication and Security Layer. ABZ 2018: 189-203 - [c49]Said Al-Riyami, Frans Coenen, Alexei Lisitsa:
A Re-evaluation of Intrusion Detection Accuracy: Alternative Evaluation Strategy. CCS 2018: 2195-2197 - [c48]Nahla Aburawi, Frans Coenen, Alexei Lisitsa:
Traversal-aware Encryption Adjustment for Graph Databases. DATA 2018: 381-387 - [c47]Andrew Fish, Alexei Lisitsa, Alexei Vernitski:
Visual Algebraic Proofs for Unknot Detection. Diagrams 2018: 89-104 - [c46]Ge Chu, Alexei Lisitsa:
Penetration Testing for Internet of Things and Its Automation. HPCC/SmartCity/DSS 2018: 1479-1484 - [c45]Nahla Aburawi, Alexei Lisitsa, Frans Coenen:
Querying Encrypted Graph Databases. ICISSP 2018: 447-451 - [c44]Alexei Lisitsa:
The Andrews-Curtis Conjecture, Term Rewriting and First-Order Proofs. ICMS 2018: 343-351 - [c43]Andrew Fish, Alexei Lisitsa, Alexei Vernitski:
Towards Human Readability of Automated Unknottedness Proofs. Bridging@IJCAI/ECAI 2018: 27-32 - [c42]Ge Chu, Alexei Lisitsa:
Poster: Agent-based (BDI) modeling for automation of penetration testing. PST 2018: 1-2 - [c41]Alexei Lisitsa:
Revisiting MU-Puzzle. A Case Study in Finite Countermodels Verification. RP 2018: 75-86 - 2017
- [c40]Mohammed Al-Zeyadi, Frans Coenen, Alexei Lisitsa:
On the mining and usage of Movement Patterns in large traffic networks. BigComp 2017: 135-142 - [c39]Mohammed Al-Zeyadi, Frans Coenen, Alexei Lisitsa:
User-to-User Recommendation using the Concept of Movement Patterns: A Study using a Dating Social Network. KDIR 2017: 173-180 - [c38]Iman Sedeeq, Frans Coenen, Alexei Lisitsa:
Attribute Permutation Steganography Detection using Attribute Position Changes Count. ICISSP 2017: 95-100 - [c37]Iman Sedeeq, Frans Coenen, Alexei Lisitsa:
A Prediction Model Based Approach to Open Space Steganography Detection in HTML Webpages. IWDW 2017: 235-247 - [c36]Alexei Lisitsa, Alexei Vernitski:
Automated Reasoning for Knot Semigroups and \pi π -orbifold Groups of Knots. MACIS 2017: 3-18 - [c35]Farah Al-Shareefi, Alexei Lisitsa, Clare Dixon:
Abstract State Machines and System Theoretic Process Analysis for Safety-Critical Systems. SBMF 2017: 15-32 - [c34]Alexei P. Lisitsa, Andrei P. Nemytykh:
Verification of Programs via Intermediate Interpretation. VPT@ETAPS 2017: 54-74 - [e6]Alexei Lisitsa, Andrei P. Nemytykh, Maurizio Proietti:
Proceedings Fifth International Workshop on Verification and Program Transformation, VPT@ETAPS 2017, Uppsala, Sweden, 29th April 2017. EPTCS 253, 2017 [contents] - [i15]Alexei P. Lisitsa, Andrei P. Nemytykh:
Verifying Programs via Intermediate Interpretation. CoRR abs/1705.06738 (2017) - 2016
- [j16]Louise A. Dennis, Michael Fisher, Nicholas Lincoln, Alexei Lisitsa, Sandor M. Veres:
Practical verification of decision-making in agent-based autonomous systems. Autom. Softw. Eng. 23(3): 305-359 (2016) - [j15]Maurice H. ter Beek, Alexei Lisitsa, Andrei P. Nemytykh, António Ravara:
Automated verification of programs and Web systems. J. Log. Algebraic Methods Program. 85(5): 653-654 (2016) - [c33]Iman Sedeeq, Frans Coenen, Alexei Lisitsa:
A Statistical Approach to the Detection of HTML Attribute Permutation Steganography. ICISSP 2016: 522-527 - [c32]Andrew Fish, Alexei Lisitsa, David Stanovský, Sarah Swartwood:
Efficient Knot Discrimination via Quandle Coloring with SAT and #-SAT. ICMS 2016: 51-58 - [c31]Mohammed Al-Zeyadi, Frans Coenen, Alexei Lisitsa:
Mining Frequent Movement Patterns in Large Networks: A Parallel Approach Using Shapes. SGAI Conf. 2016: 53-67 - [e5]Geoff W. Hamilton, Alexei Lisitsa, Andrei P. Nemytykh:
Proceedings of the Fourth International Workshop on Verification and Program Transformation, VPT@ETAPS 2016, Eindhoven, The Netherlands, 2nd April 2016. EPTCS 216, 2016 [contents] - 2015
- [j14]Boris Konev, Alexei Lisitsa:
Computer-aided proof of Erdős discrepancy properties. Artif. Intell. 224: 103-118 (2015) - [j13]Alexei Lisitsa:
First-order logic for safety verification of hedge rewriting systems. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 72 (2015) - [c30]Andrew Fish, Alexei Lisitsa, David Stanovský:
A Combinatorial Approach to Knot Recognition. EGC 2015: 64-78 - [c29]Alexei P. Lisitsa, Andrei P. Nemytykh:
Finite Countermodel Based Verification for Program Transformation (A Case Study). VPT@ETAPS 2015: 15-32 - [e4]Alexei Lisitsa, Andrei P. Nemytykh, Alberto Pettorossi:
Proceedings of the Third International Workshop on Verification and Program Transformation, VPT@ETAPS 2015, London, United Kingdom, 11th April 2015. EPTCS 199, 2015 [contents] - [i14]Andrew Fish, Alexei Lisitsa, David Stanovský:
A combinatorial approach to knot recognition. CoRR abs/1505.06595 (2015) - 2014
- [j12]Ting Wang, Sheng-Uei Guan, Ka Lok Man, T. O. Ting, Alexei Lisitsa:
Optimized Neural Incremental Attribute Learning for Classification Based on Statistical discriminability. Int. J. Comput. Intell. Appl. 13(4) (2014) - [c28]Alexei Lisitsa, Andrei P. Nemytykh:
A Note on Program Specialization. What Syntactical Properties of Residual Programs Can Reveal? VPT@CAV 2014: 52-65 - [c27]Jerry Swan, Zoltan A. Kocsis, Alexei Lisitsa:
The 'representative' metaheuristic design pattern. GECCO (Companion) 2014: 1435-1436 - [c26]Andrew Fish, Alexei Lisitsa:
Detecting Unknots via Equational Reasoning, I: Exploration. CICM 2014: 76-91 - [c25]Boris Konev, Alexei Lisitsa:
A SAT Attack on the Erdős Discrepancy Conjecture. SAT 2014: 219-226 - [e3]Alexei Lisitsa, Andrei P. Nemytykh:
VPT 2014. Second International Workshop on Verification and Program Transformation, July 17-18, 2014, Vienna, Austria, The workshop is an event of the Vienna Summer of Logic 2014 and it is co-located with the 26th International Conference on Computer Aided Verification CAV 2014. EPiC Series in Computing 28, EasyChair 2014 [contents] - [i13]Boris Konev, Alexei Lisitsa:
A SAT Attack on the Erdos Discrepancy Conjecture. CoRR abs/1402.2184 (2014) - [i12]Boris Konev, Alexei Lisitsa:
Computer-Aided Proof of Erdos Discrepancy Properties. CoRR abs/1405.3097 (2014) - [i11]Andrew Fish, Alexei Lisitsa:
Detecting unknots via equational reasoning, I: Exploration. CoRR abs/1405.4211 (2014) - 2013
- [j11]Nick K. Lincoln, Sandor M. Veres, Louise A. Dennis, Michael Fisher, Alexei Lisitsa:
Autonomous Asteroid Exploration by Rational Agents. IEEE Comput. Intell. Mag. 8(4): 25-38 (2013) - [j10]Alexei Lisitsa:
Finite Reasons for Safety - Parameterized Verification by Finite Model Finding. J. Autom. Reason. 51(4): 431-451 (2013) - [c24]Abdulbasit Ahmed, Alexei Lisitsa, Andrei P. Nemytykh:
Cryptographic Protocol Verification via Supercompilation (A Case Study). VPT@CAV 2013: 16-29 - [e2]Alexei Lisitsa, Andrei P. Nemytykh:
First International Workshop on Verification and Program Transformation, VPT 2013, Saint Petersburg, Russia, July 12-13, 2013. EPiC Series in Computing 16, EasyChair 2013 [contents] - [i10]Louise A. Dennis, Michael Fisher, Nicholas Lincoln, Alexei Lisitsa, Sandor M. Veres:
Practical Verification of Decision-Making in Agent-Based Autonomous Systems. CoRR abs/1310.2431 (2013) - [i9]Alexei Lisitsa:
First-order theorem proving in the exploration of Andrews-Curtis conjecture. Tiny Trans. Comput. Sci. 2 (2013) - 2012
- [c23]Alexei Lisitsa:
Finite Models vs Tree Automata in Safety Verification. RTA 2012: 225-239 - [i8]Alexei Lisitsa, Andrei P. Nemytykh:
A Note on Program Specialization. What Can Syntactical Properties of Residual Programs Reveal? CoRR abs/1209.5407 (2012) - 2011
- [c22]Alexei Lisitsa, Igor Potapov, Rafiq Saleh:
Planarity of Knots, Register Automata and LogSpace Computability. LATA 2011: 366-377 - [c21]Abdulbasit Ahmed, Alexei Lisitsa, Clare Dixon:
A misuse-based network Intrusion Detection System using Temporal Logic and stream processing. NSS 2011: 1-8 - [c20]Alexei Lisitsa:
Temporal Access to the Iteration Sequences: A Unifying Approach to Fixed Point Logics. TIME 2011: 57-63 - [i7]Alexei Lisitsa:
First-order finite satisfiability vs tree automata in safety verification. CoRR abs/1107.0349 (2011) - [i6]Alexei Lisitsa:
Finite countermodels for safety verification of parameterized tree systems. CoRR abs/1107.5142 (2011) - 2010
- [j9]Louise A. Dennis, Michael Fisher, Alexei Lisitsa, Nicholas Lincoln, Sandor M. Veres:
Satellite Control Using Rational Agent Programming. IEEE Intell. Syst. 25(3): 92-97 (2010) - [j8]Alexei Lisitsa, Andrei P. Nemytykh:
On one application of computations with oracle. Program. Comput. Softw. 36(3): 157-165 (2010) - [c19]Nicholas Lincoln, Sandor M. Veres, Louise A. Dennis, Michael Fisher, Alexei Lisitsa:
An agent based framework for adaptive control and decision making of autonomous vehicles. ALCOSP 2010: 310-317 - [c18]Alexei Lisitsa:
Reachability as Derivability, Finite Countermodels and Verification. ATVA 2010: 233-244 - [c17]Alexei Lisitsa:
Finite countermodels as invariants. A case study in verification of parameterized mutual exclusion protocol. WING@ETAPS/IJCAR 2010: 150-151 - [c16]Louise A. Dennis, Michael Fisher, Nicholas Lincoln, Alexei Lisitsa, Sandor M. Veres:
Declarative Abstractions for Agent Based Hybrid Control Systems. DALT 2010: 96-111 - [i5]Alexei Lisitsa:
Finite Model Finding for Parameterized Verification. CoRR abs/1011.0447 (2010)
2000 – 2009
- 2009
- [j7]Alexei Lisitsa, Igor Potapov:
On the Computational Power of Querying the History. Fundam. Informaticae 91(2): 395-409 (2009) - [c15]Alexei Lisitsa, Igor Potapov, Rafiq Saleh:
Automata on Gauss Words. LATA 2009: 505-517 - [c14]Louise A. Dennis, Michael Fisher, Nicholas Lincoln, Alexei Lisitsa, Sandor M. Veres:
Agent Based Approaches to Engineering Autonomous Space Software. FMA 2009: 63-67 - [p1]Michael Fisher, Boris Konev, Alexei Lisitsa:
Temporal Verification of Fault-Tolerant Protocols. Methods, Models and Tools for Fault Tolerance 2009: 44-56 - [i4]Vitaliy Kurlin, Alexei Lisitsa, Igor Potapov, Rafiq Saleh:
On Descriptional Complexity of the Planarity Problem for Gauss Words. CoRR abs/0907.4180 (2009) - 2008
- [j6]Alexei Lisitsa, Andrei P. Nemytykh:
Reachability Analysis in Verification via Supercompilation. Int. J. Found. Comput. Sci. 19(4): 953-969 (2008) - [c13]Clare Dixon, Michael Fisher, Boris Konev, Alexei Lisitsa:
Practical First-Order Temporal Reasoning. TIME 2008: 156-163 - [i3]Alexei Lisitsa:
A logic with temporally accessible iteration. CoRR abs/0806.2802 (2008) - 2007
- [j5]Alexei Lisitsa, Andrei P. Nemytykh:
Verification as a parameterized testing (experiments with the SCP4 supercompiler). Program. Comput. Softw. 33(1): 14-23 (2007) - [c12]Alexei Lisitsa, Andrei P. Nemytykh:
A Note on Specialization of Interpreters. CSR 2007: 237-248 - [i2]Clare Dixon, Michael Fisher, Boris Konev, Alexei Lisitsa:
Efficient First-Order Temporal Logic for Infinite-State Systems. CoRR abs/cs/0702036 (2007) - 2006
- [c11]Alexei Lisitsa, Igor Potapov:
In time alone: on the computational power of querying the history. TIME 2006: 42-49 - [e1]Michael Fisher, Wiebe van der Hoek, Boris Konev, Alexei Lisitsa:
Logics in Artificial Intelligence, 10th European Conference, JELIA 2006, Liverpool, UK, September 13-15, 2006, Proceedings. Lecture Notes in Computer Science 4160, Springer 2006, ISBN 3-540-39625-X [contents] - 2005
- [c10]Alexei Lisitsa, Andrei P. Nemytykh:
Towards Verification via Supercompilation. COMPSAC (2) 2005: 9-10 - [c9]Alexei Lisitsa, Igor Potapov:
Temporal Logic with Predicate lambda-Abstraction. TIME 2005: 147-155 - [c8]Michael Fisher, Boris Konev, Alexei Lisitsa:
Practical Infinite-State Verification with Temporal Reasoning. VISSAS 2005: 91-100 - 2004
- [c7]Michael Fisher, Alexei Lisitsa:
Monodic ASMs and Temporal Verification. Abstract State Machines 2004: 95-110 - [c6]Alexei Lisitsa, Igor Potapov:
Membership and Reachability Problems for Row-Monomial Transformations. MFCS 2004: 623-634 - [i1]Alexei Lisitsa, Igor Potapov:
Temporal logic with predicate abstraction. CoRR cs.LO/0410072 (2004) - 2002
- [j4]Anatoli Degtyarev, Michael Fisher, Alexei Lisitsa:
Equality and Monodic First-Order Temporal Logic. Stud Logica 72(2): 147-156 (2002) - [c5]James Brotherston, Anatoli Degtyarev, Michael Fisher, Alexei Lisitsa:
Searching for Invariants Using Temporal Resolution. LPAR 2002: 86-101 - 2000
- [c4]Alexei Lisitsa:
Generalized vs formula circumscription over finite models. AI&M 2000
1990 – 1999
- 1999
- [j3]Alexei Lisitsa, Vladimir Yu. Sazonov:
Linear Ordering on Graphs, Anti-Founded Sets and Polynomial Time Computability. Theor. Comput. Sci. 224(1-2): 173-213 (1999) - 1997
- [j2]Alexei Lisitsa, Vladimir Yu. Sazonov:
Delta-Languages for Sets and LOGSPACE Computable Graph Transformers. Theor. Comput. Sci. 175(1): 183-222 (1997) - [c3]Alexei Lisitsa, Vladimir Yu. Sazonov:
Bounded Hyperset Theory and Web-like Data Bases. Kurt Gödel Colloquium 1997: 172-185 - [c2]Alexei Lisitsa, Vladimir Yu. Sazonov:
On Linear Ordering of Strongly Extensional Finitely-Branching Graphs and Non-well-founded Sets. LFCS 1997: 178-188 - 1995
- [c1]Vladimir Yu. Sazonov, Alexei Lisitsa:
Delta-Languages for Sets and sub-PTIME Graphs Transformers. ICDT 1995: 125-138 - 1993
- [j1]Alexei Lisitsa:
Complexity of Universal Circumscription. Int. J. Found. Comput. Sci. 4(3): 241-244 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint