Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effectiveness of qualitative and quantitative security obligations., , , , and . J. Inf. Secur. Appl., (2015)Social AI and the Challenges of the Human-AI Ecosystem., , , , , , , , , and 6 other author(s). CoRR, (2023)The Value of Values and Norms in Social Simulation., , and . J. Artif. Soc. Soc. Simul., (2019)Meeting the Deadline: Why, When and How., , , and . FAABS, volume 3228 of Lecture Notes in Computer Science, page 30-40. Springer, (2004)Role-assignment in open agent societies., , and . AAMAS, page 489-496. ACM, (2003)A Qualitative Evaluation of Social Support by an Empathic Agent., , and . IVA, volume 8108 of Lecture Notes in Computer Science, page 358-367. Springer, (2013)Organizing Scalable Adaptation in Serious Games., , and . AEGS, volume 7471 of Lecture Notes in Computer Science, page 106-122. Springer, (2011)From Individuals to Social and Vice-versa., , and . ESAW, volume 5485 of Lecture Notes in Computer Science, page 264-279. Springer, (2008)A logic of agent organizations., and . Logic Journal of the IGPL, 20 (1): 283-316 (2012)Human-agent-robot teamwork., , , and . HRI, page 487-488. ACM, (2012)