Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Architecture Correctness., and . IEEE Software, 18 (6): 64-65 (2001)Dynamic adaptive autonomy in multi-agent systems., , and . J. Exp. Theor. Artif. Intell., 12 (2): 129-147 (2000)Understanding victim-enabled identity theft., , and . PST, page 196-202. IEEE, (2016)Agent-Oriented Design., , and . MAAMAW, volume 1647 of Lecture Notes in Computer Science, page 28-40. Springer, (1999)Team Formation Strategies in a Dynamic Large-Scale Environment., and . MMAS/LSMAS/CCMMS, volume 5043 of Lecture Notes in Computer Science, page 92-106. Springer, (2006)Problem-Solving Frameworks for Sensible Agents in an Electronic Market., , , , , , and . IEA/AIE, volume 1611 of Lecture Notes in Computer Science, page 470-479. Springer, (1999)Debugging Agent Behavior in an Implemented Agent System., and . PROMAS, volume 3346 of Lecture Notes in Computer Science, page 104-125. Springer, (2004)It Is an Equal Failing to Trust Everybody and to Trust Nobody: Stock Price Prediction Using Trust Filters and Enhanced User Sentiment on Twitter., , and . ACM Trans. Internet Techn., 19 (4): 48:1-48:20 (2019)A Large Publicly Available Corpus of Website Privacy Policies Based on DMOZ., and . CODASPY, page 143-148. ACM, (2021)Quantifying the search space for multi-agent system decision-making organizations., , and . Connect. Sci., 14 (4): 265-281 (2002)