Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Public Plans to Global Solutions in Multiagent Planning., , and . EUMAS/AT, volume 9571 of Lecture Notes in Computer Science, page 21-33. Springer, (2015)Multiagent Planning Supported by Plan Diversity Metrics and Landmark Actions., , , , and . ICAART (1), page 178-189. SciTePress, (2014)Agent-Based Network Protection Against Malicious Code., , , , , and . CEEMAS, volume 4696 of Lecture Notes in Computer Science, page 22-31. Springer, (2007)Towards formal model of adversarial action in multi-agent systems., , and . AAMAS, page 420-422. ACM, (2006)ε-Strong Privacy Preserving Multiagent Planner by Computational Tractability., , and . ICAART (1), page 51-57. SciTePress, (2017)Planning of Diverse Trajectories., , and . ICAART (2), page 120-129. SciTePress, (2013)Meta-reasoning Methods for Agent's Intention Modelling., , and . AIS-ADM, volume 3505 of Lecture Notes in Computer Science, page 134-148. Springer, (2005)Meta-reasoning for Agents' Private Knowledge Detection., , and . CIA, volume 2782 of Lecture Notes in Computer Science, page 316-323. Springer, (2003)Adversarial Behavior in Multi-agent Systems., , and . CEEMAS, volume 3690 of Lecture Notes in Computer Science, page 470-479. Springer, (2005)The Limits of Strong Privacy Preserving Multi-Agent Planning., , and . ICAPS, page 297-305. AAAI Press, (2017)