Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CORE: A Trust Model for Agent Coalition Formation., , and . ICNC (5), page 541-545. IEEE Computer Society, (2009)Never Ignore the Significance of Different Anomalies: A Cost-Sensitive Algorithm Based on Loss Function for Anomaly Detection., , , , and . ICTAI, page 1099-1105. IEEE Computer Society, (2015)Cost optimal planning with LP-based multi-valued landmark heuristic., , and . AAMAS, page 509-516. IFAAMAS/ACM, (2014)Chinese Medicine Formula Network Analysis for Core Herbal Discovery., , , , and . Brain Informatics, volume 7670 of Lecture Notes in Computer Science, page 255-264. Springer, (2012)Planning with Multi-Valued Landmarks., , , , and . AAAI, page 1653-1654. AAAI Press, (2013)Preprocessing for Point-Based Algorithms of POMDPs., , and . ICTAI (1), page 519-522. IEEE Computer Society, (2008)A Factor-Based Model for Context-Sensitive Skill Rating Systems., , , and . ICTAI (2), page 249-255. IEEE Computer Society, (2010)978-0-7695-4263-8.Text Summarization Based on Sentence Selection with Semantic Representation., , , and . ICTAI, page 584-590. IEEE Computer Society, (2014)Coalitional Planning in Game-like Domains via ATL Model Checking., , , and . ICTAI, page 645-652. IEEE Computer Society, (2009)A Multiple Eigenspaces Constructing Method and Its Application to Face Recognition., , , , and . ICNC (2), volume 3611 of Lecture Notes in Computer Science, page 55-64. Springer, (2005)