Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber-Physical Systems, , and . SEI Series in Software Engineering Addison-Wesley, Boston, (2017)Handling Emergent Resource Use Oscillations., , and . KES, volume 3215 of Lecture Notes in Computer Science, page 809-816. Springer, (2004)From problems to protocols: Towards a negotiation handbook., , , and . Decis. Support Syst., (2014)High-Speed Idea Filtering with the Bag of Lemons., and . IEEE Intell. Informatics Bull., 16 (1): 8-9 (2015)REACT: reactive resilience for critical infrastructures using graph-coloring techniques., , , , and . J. Netw. Comput. Appl., (2019)To boldly go: an occam-π mission to engineer emergence., , , and . Nat. Comput., 11 (3): 449-474 (2012)Conflict management as part of an integrated exception handling approach.. Artif. Intell. Eng. Des. Anal. Manuf., 9 (4): 259-267 (1995)Using an Annealing Mediator to Solve the Prisoners' Dilemma in the Negotiation of Complex Contracts., , and . AMEC, volume 2531 of Lecture Notes in Computer Science, page 194-202. Springer, (2002)A Knowledge-Based Methodology for Designing Reliable Multi-agent Systems.. AOSE, volume 2935 of Lecture Notes in Computer Science, page 85-95. Springer, (2003)Discovering Services: Towards High-Precision Service Retrieval., and . WES, volume 2512 of Lecture Notes in Computer Science, page 260-276. Springer, (2002)