Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anticipation and anticipatory behavior: II., , and . Cogn. Process., 8 (3): 149-150 (2007)Designing and Implementing MABS in AKIRA., and . MABS, volume 3415 of Lecture Notes in Computer Science, page 49-64. Springer, (2004)Integrating Trustfulness and Decision Using Fuzzy Cognitive Maps., , and . iTrust, volume 2692 of Lecture Notes in Computer Science, page 195-210. Springer, (2003)Behavioral Implicit Communication (BIC): Communicating with Smart Environments., , and . IJACI, 2 (1): 1-12 (2010)Evolution of a predictive internal model in an embodied and situated agent., , and . Theory Biosci., 130 (4): 259-276 (2011)Why a Cognitive Trustier Performs Better: Simulating Trust-Based Contract Nets., , , and . AAMAS, page 1394-1395. IEEE Computer Society, (2004)The geometry of efficient codes: how rate-distortion trade-offs distort the latent representations of generative models., , and . CoRR, (2024)Skilled motor control of an inverted pendulum implies low entropy of states but high entropy of actions., , , , , and . PLoS Comput. Biol., (January 2023)Learning programs is better than learning dynamics: A programmable neural network hierarchical architecture in a multi-task scenario., , , , and . Adapt. Behav., 24 (1): 27-51 (2016)Fuzzy-based Schema Mechanisms in AKIRA., , , and . CIMCA/IAWTIC, page 146-152. IEEE Computer Society, (2005)