Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fuzzy model of reputation in multi-agent systems., , and . Agents, page 25-26. ACM, (2001)Reaching Agreements through Fuzzy Counter-Offers., , and . ICWE, volume 2722 of Lecture Notes in Computer Science, page 90-93. Springer, (2003)Adaptive Agents Applied to Intrusion Detection., , and . CEEMAS, volume 2691 of Lecture Notes in Computer Science, page 445-453. Springer, (2003)Fusion of Surveillance Information for Visual Sensor Networks., , , , and . FUSION, page 1-8. IEEE, (2006)A Machine Learning Based Evaluation of a Negotiation between Agents Involving Fuzzy Counter-Offers., and . AWIC, volume 2663 of Lecture Notes in Computer Science, page 268-277. Springer, (2003)Privacy of Trust in Similarity Estimation through Secure Computations., , and . DEXA Workshops, page 498-504. IEEE Computer Society, (2002)Secure Matchmaking of Fuzzy Criteria between Agents., , and . KES, volume 2773 of Lecture Notes in Computer Science, page 1185-1191. Springer, (2003)A JADE-Based ART-Inspired Ontology and Protocols for Handling Trust and Reputation., and . ISDA, page 300-305. IEEE Computer Society, (2009)Trust Management Through Fuzzy Reputation., , and . Int. J. Cooperative Inf. Syst., 12 (1): 135-155 (2003)Subjective Trust Inferred by Kalman Filtering vs. a Fuzzy Reputation., , and . ER (Workshops), volume 3289 of Lecture Notes in Computer Science, page 496-505. Springer, (2004)