Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling opponent decision in repeated one-shot negotiations., , and . AAMAS, page 397-403. ACM, (2005)Reciprocal resource sharing in P2P environments., , , and . AAMAS, page 853-859. ACM, (2005)An Efficient Protocol for Negotiation over Multiple Indivisible Resources., and . IJCAI, page 1494-1499. (2007)Sustainable Agent Communities., , and . EUMAS, page 3-17. Koninklijke Vlaamse Academie van Belie voor Wetenschappen en Kunsten, (2005)YouLighter: A Cognitive Approach to Unveil YouTube CDN and Changes., , , , , , and . IEEE Trans. Cogn. Commun. Netw., 1 (2): 161-174 (2015)Macroscopic view of malware in home networks., , , , , , , and . CCNC, page 262-266. IEEE, (2015)Detecting malicious HTTP redirections using trees of user browsing activity., , , , and . INFOCOM, page 1159-1167. IEEE, (2014)A Bayes Net Approach to Argumentation Based Negotiation., and . ArgMAS, volume 3366 of Lecture Notes in Computer Science, page 208-222. Springer, (2004)Emergence and Stability of Collaborations Among Rational Agents., , and . CIA, volume 2782 of Lecture Notes in Computer Science, page 192-205. Springer, (2003)On Understanding User Interests through Heterogeneous Data Sources., , , , and . PAM, volume 8362 of Lecture Notes in Computer Science, page 272-274. Springer, (2014)