Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Loss in Distributed Constraint Reasoning: A Quantitative Framework for Analysis and its Applications., , , , and . Auton. Agents Multi Agent Syst., 13 (1): 27-60 (2006)Experimental analysis of privacy loss in DCOP algorithms., , , and . AAMAS, page 1424-1426. ACM, (2006)Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling., , , , and . AAMAS, page 310-317. IEEE Computer Society, (2004)An efficient heuristic approach for security against multiple adversaries., , , , and . AAMAS, page 181. IFAAMAS, (2007)Valuations of Possible States (VPS): a quantitative framework for analysis of privacy loss among collaborative personal assistant agents., , , , and . AAMAS, page 1030-1037. ACM, (2005)How local is that optimum? k-optimality for DCOP., , and . AAMAS, page 1303-1304. ACM, (2005)Solution sets for DCOPs and graphical games., , and . AAMAS, page 577-584. ACM, (2006)Analysis of Privacy Loss in Distributed Constraint Optimization., , and . AAAI, page 647-653. AAAI Press, (2006)An Efficient Heuristic for Security against Multiple Adversaries in Stackelberg Games., , , , and . AAAI Spring Symposium: Game Theoretic and Decision Theoretic Agents, page 38-46. AAAI, (2007)Quality Guarantees on k-Optimal Solutions for Distributed Constraint Optimization Problems., and . IJCAI, page 1446-1451. (2007)