Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building THINC: user incentivization and meeting rescheduling for energy savings., , , , and . AAMAS, page 925-932. IFAAMAS/ACM, (2014)Enhancing Poaching Predictions for Under-Resourced Wildlife Conservation Parks Using Remote Sensing Imagery., , , , , and . CoRR, (2020)Research Directions for Service-Oriented Multiagent Systems., , , , , , , , , and 10 other author(s). IEEE Internet Comput., 9 (6): 65-70 (2005)Computational Game Theory for Security and Sustainability., , and . J. Inf. Process., 22 (2): 176-185 (2014)An extended study on multi-objective security games., , , , and . Auton. Agents Multi Agent Syst., 28 (1): 31-71 (2014)General-Sum Cyber Deception Games under Partial Attacker Valuation Information., , , , and . AAMAS, page 2215-2217. International Foundation for Autonomous Agents and Multiagent Systems, (2019)Event Tracking for an Intelligent Automated Agent., and . TIME, page 60-68. University of Regina, Regina, SK, Canada, (1994)Maximizing Awareness about HIV in Social Networks of Homeless Youth with Limited Information., , , , , and . IJCAI, page 4959-4963. ijcai.org, (2017)The RoboCup Synthetic Agent Challenge 97., , , , , , , , and . IJCAI (1), page 24-30. Morgan Kaufmann, (1997)Quality Guarantees on k-Optimal Solutions for Distributed Constraint Optimization Problems., and . IJCAI, page 1446-1451. (2007)