Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchies, Holons, and Agent Coordination, , , and . (2006)Using Statecharts and Modal Logics to Model Multiagent Plans and Transactions. (2002)Using the pi-Calculus to Model Multiagent Systems., and . FAABS, volume 1871 of Lecture Notes in Computer Science, page 164-179. Springer, (2000)An Investigation of Biometric Authentication in the Healthcare Environment., , , , , and . Array, (2020)Reactive Symbolic Planning and Control in Dynamic Adversarial Environments., , , , and . IEEE Trans. Autom. Control., 68 (6): 3409-3424 (June 2023)Identity Judgments, Situations, and Semantic Web Representations., , and . AIMSA, volume 9883 of Lecture Notes in Computer Science, page 237-246. Springer, (2016)Formalization of the responsive and formal design process using category theory., , and . SysCon, page 1-8. IEEE, (2018)A Survey of Attacks and Defenses for Deep Neural Networks., , and . CSR, page 254-261. IEEE, (2023)Security and a Framework for Identity., and . SSCI, page 1872-1878. IEEE, (2020)On the Effectiveness of Collaborative Tagging Systems for Describing Resources., , , , and . CSIE (4), page 467-471. IEEE Computer Society, (2009)