Author of the publication

Agents vs. pirates: multi-agent simulation and optimization to fight maritime piracy.

, , , and . AAMAS, page 37-44. IFAAMAS, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ExPlanTech: Multiagent Support for Manufacturing Decision Making., , and . IEEE Intell. Syst., 20 (1): 67-74 (2005)Adaptive Multiagent System for Network Traffic Monitoring., , , , , and . IEEE Intelligent Systems, 24 (3): 16-25 (2009)Combining Incremental Strategy Generation and Branch and Bound Search for Computing Maxmin Strategies in Imperfect Recall Games., , and . AAMAS, page 902-910. ACM, (2017)Multi-agent approach to network intrusion detection., , , , , and . AAMAS (Demos), page 1695-1696. IFAAMAS, (2008)Meta-reasoning Methods for Agent's Intention Modelling., , and . AIS-ADM, volume 3505 of Lecture Notes in Computer Science, page 134-148. Springer, (2005)A-Globe: Agent Platform with Inaccessibility and Mobility Support., , and . CIA, volume 3191 of Lecture Notes in Computer Science, page 199-214. Springer, (2004)Meta-reasoning for Agents' Private Knowledge Detection., , and . CIA, volume 2782 of Lecture Notes in Computer Science, page 316-323. Springer, (2003)Incrementally Refined Acquaintance Model for Distributed Planning and Resource Allocation in Semi-trusted Environments., , and . Web Intelligence/IAT Workshops, page 391-394. IEEE Computer Society, (2007)Agent subset adversarial search for complex non-cooperative domains., , , and . CIG, page 211-218. IEEE, (2010)Adversarial Behavior in Multi-agent Systems., , and . CEEMAS, volume 3690 of Lecture Notes in Computer Science, page 470-479. Springer, (2005)