Author of the publication

Deception in Drone Surveillance Missions: Strategic vs. Learning Approaches.

, , , , , and . MobiHoc, page 382-387. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formalizing and verifying protocol refinements., and . ACM TIST, 4 (2): 21:1-21:27 (2013)Koko: architecture and methodology for engineering social affective applications., and . AAMAS (2), page 1137-1138. IFAAMAS, (2009)Choice, interoperability, and conformance in interaction protocols and service choreographies., , , , , and . AAMAS (2), page 843-850. IFAAMAS, (2009)Flexible protocol specification and execution: applying event calculus planning using commitments., and . AAMAS, page 527-534. ACM, (2002)Emergent properties of referral systems., and . AAMAS, page 592-599. ACM, (2003)Moral Judgments in Narratives on Reddit: Investigating Moral Sparks via Social Commonsense and Linguistic Signals., and . CoRR, (2023)Logic-Based Agent Verification., , , and . J. Appl. Log., 5 (2): 193-195 (2007)Interaction-Oriented Programming: An Application Semantics Approach for Engineering Decentralized Applications., , and . PODC, page 575-576. ACM, (2021)Maintenance of Social Commitments in Multiagent Systems., , and . AAAI, page 11369-11377. AAAI Press, (2021)Determining Team Hierarchy from Broadcast Communications., , , , and . SocInfo, volume 8851 of Lecture Notes in Computer Science, page 493-507. Springer, (2014)