Author of the publication

Solving non-zero sum multiagent network flow security games with attack costs.

, , and . AAMAS, page 879-888. IFAAMAS, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coordination of Multiple Intelligent Agents in the Infosphere.. ICMAS, page 432-433. The MIT Press, (1995)Calendar Agents on the Semantic Web., , and . IEEE Intelligent Systems, 17 (3): 84-86 (2002)Robust Human Interaction with Robotic Swarms.. ICAART (1), page 5. SciTePress, (2016)Identifying Culture and Leveraging Cultural Differences for Negotiation Agents., , , , , and . HICSS, page 618-627. IEEE Computer Society, (2012)Evolution of Goal-Directed Behavior from Limited Information in a Complex Environment., and . GECCO, page 1281-1288. Morgan Kaufmann, (1999)Deception in networks of mobile sensing agents., , , and . AAMAS, page 1031-1038. IFAAMAS, (2010)OWLS-MX: Hybrid OWL-S Service Matchmaking., , , and . AAAI Fall Symposium: Agents and the Semantic Web, volume FS-05-01 of AAAI Technical Report, page 77-84. AAAI Press, (2005)A pareto optimal model for automated multi-attribute negotiations., , and . AAMAS, page 246. IFAAMAS, (2007)Subjective approximate solutions for decentralized POMDPs., and . AAMAS, page 224. IFAAMAS, (2007)Agents supporting humans and organizations in open, dynamic environments.. AAMAS, page 1043. ACM, (2002)