Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning as Meaning Negotiation: A Model Based on English Auction., and . KES-AMSTA, volume 5559 of Lecture Notes in Computer Science, page 60-69. Springer, (2009)Topological Reasoning in Basic Description., , and . Description Logics, volume 189 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)Energy Saving by Ambient Intelligence Techniques., , and . NBiS, page 157-164. IEEE Computer Society, (2014)Compliant Business Process Design by Declarative Specifications., , , and . PRIMA, volume 8291 of Lecture Notes in Computer Science, page 213-228. Springer, (2013)"It Could Be Worse, It Could Be Raining": Reliable Automatic Meteorological Forecasting for Holiday Planning., , , and . IEA/AIE, volume 11606 of Lecture Notes in Computer Science, page 3-11. Springer, (2019)Strategic Argumentation is NP-Complete., , , , and . ECAI, volume 263 of Frontiers in Artificial Intelligence and Applications, page 399-404. IOS Press, (2014)Fundamental Issues of Aesthetic Knowledge Representation., and . ECAI, page 313-317. IOS Press, (2004)The Complexity of Reasoning about Spatial Congruence. CoRR, (2011)Compliant Business Processes with Exclusive Choices from Agent Specification., , and . PRIMA, volume 9387 of Lecture Notes in Computer Science, page 603-612. Springer, (2015)The Spider-man Behavior Protocol: Exploring Both Public and Dark Social Networks for Fake Identity Detection in Terrorism Informatics., , , and . KDWeb, volume 1489 of CEUR Workshop Proceedings, page 77-88. CEUR-WS.org, (2015)