Author of the publication

Constructing a Human-like agent for the Werewolf Game using a psychological model based multiple perspectives.

, , , , , , and . SSCI, page 1-8. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SMURF software architecture for low power mobile robots: experience in search and rescue operations., , , , , , and . SSRR, page 264-269. IEEE, (2022)KODAMA: as a distributed multi-agent system., , , , , , and . ICPADS Workshops, page 435-440. IEEE Computer Society, (2000)Intrusion Detection Using Third-Parties Support., , , and . FTDCS, page 206-212. IEEE Computer Society, (2008)Agent-Community-Network-Based Secure Collaboration Support System., , , , and . ATOP@AAMAS, volume 25 of Lecture Notes in Business Information Processing, page 234-255. Springer, (2008)Improvement of Detection for Warning Students in E-learning Using Web Cameras., and . KES, volume 35 of Procedia Computer Science, page 747-756. Elsevier, (2014)Assignment strategy selection for multi-car elevator group control using reinforcement learning., and . Int. J. Knowl. Web Intell., 3 (2): 163-179 (2012)Debugging Mobile Agent Systems., , , , , and . iiWAS, page 667. ACM, (2013)Data Traffic Reduction for Mobile Agent Migration., , , and . ICAART (2), page 351-354. SciTePress, (2012)Discovery of Frequent Tag Tree Patterns in Semistructured Web Documents., , , , , and . PAKDD, volume 2336 of Lecture Notes in Computer Science, page 341-355. Springer, (2002)Polynomial Time Matching Algorithms for Tree-Like Structured Patterns in Knowledge Discovery., , , , and . PAKDD, volume 1805 of Lecture Notes in Computer Science, page 5-16. Springer, (2000)