Author of the publication

Manipulation of Java agent bytecode to add roles.

, , and . PPPJ, volume 42 of ACM International Conference Proceeding Series, page 7-12. ACM, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Java mobile computing on the IBM Jikes research virtual machine., , and . PPPJ, volume 178 of ACM International Conference Proceeding Series, page 62-71. ACM, (2006)Agent roles: From methodologies to infrastructures., , and . CTS, page 416-423. IEEE, (2008)Adaptive game-based agent negotiation in deregulated energy markets., , , and . CTS, page 300-307. IEEE, (2012)An evaluation method for Self-Adaptive systems., , , and . SMC, page 2814-2820. IEEE, (2016)The Influence of the Picking Times of the Components in Time and Space Assembly Line Balancing Problems: An Approach with Evolutionary Algorithms., , , and . SSCI, page 1021-1028. IEEE, (2015)MailConfigurator: automatic configuration of e-mail accounts through Java mobile agents., , and . PPPJ, volume 91 of ACM International Conference Proceeding Series, page 141-142. ACM, (2004)How to Dynamically Add Roles to Agents., , and . WOA, page 117-123. Pitagora Editrice Bologna, (2002)Identification of Social Aspects by Means of Inertial Sensor Data., and . Inf., 11 (11): 534 (2020)Agent Composition via Role-based Infrastructures.. Scalable Comput. Pract. Exp., (2006)Specification and verification of railway safety-critical systems using TLA+: A Case Study., , , and . WETICE, page 207-212. IEEE, (2020)