Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques., , , , and . SOUPS, USENIX Association, (2017)Mismorphism: a semiotic model of computer security circumvention (poster abstract)., , , and . HotSoS, page 25:1-25:2. ACM, (2015)Visualizing Multiple Levels and Dimensions of Social Network Properties., , and . Handbook of Human Centric Visualization, Springer, (2014)The Workshops at the Twentieth National Conference on Artificial Intelligence., , , , , , , , , and 17 other author(s). AI Magazine, 26 (4): 102-108 (2005)A Complete Bidirectional Planner., and . AIPS, page 78-85. AAAI, (1998)Eyes on URLs: Relating Visual Behavior to Safety Decisions., , , , , , and . ETRA, page 19:1-19:10. ACM, (2020)Planning with External Events.. UAI, page 94-101. Morgan Kaufmann, (1994)Massive Multi-agent Data-Driven Simulations of the GitHub Ecosystem., , , , , , , , , and 5 other author(s). PAAMS, volume 11523 of Lecture Notes in Computer Science, page 3-15. Springer, (2019)Analogical Replay for Efficient Conditional Planning., and . AAAI/IAAI, page 668-673. AAAI Press / The MIT Press, (1997)Object-Oriented System Modeling with OMT., , , and . OOPSLA, page 359-376. ACM, (1992)SIGPLAN Notices 27(10).