Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Trustfulness and Decision Using Fuzzy Cognitive Maps., , and . iTrust, volume 2692 of Lecture Notes in Computer Science, page 195-210. Springer, (2003)Behavioral Implicit Communication (BIC): Communicating with Smart Environments., , and . IJACI, 2 (1): 1-12 (2010)Anticipation and anticipatory behavior: II., , and . Cogn. Process., 8 (3): 149-150 (2007)Evolution of a predictive internal model in an embodied and situated agent., , and . Theory Biosci., 130 (4): 259-276 (2011)Designing and Implementing MABS in AKIRA., and . MABS, volume 3415 of Lecture Notes in Computer Science, page 49-64. Springer, (2004)Why a Cognitive Trustier Performs Better: Simulating Trust-Based Contract Nets., , , and . AAMAS, page 1394-1395. IEEE Computer Society, (2004)The geometry of efficient codes: how rate-distortion trade-offs distort the latent representations of generative models., , and . CoRR, (2024)Nonparametric Problem-Space Clustering: Learning Efficient Codes for Cognitive Control Tasks., , and . Entropy, 18 (2): 61 (2016)Skilled motor control of an inverted pendulum implies low entropy of states but high entropy of actions., , , , , and . PLoS Comput. Biol., (January 2023)Learning programs is better than learning dynamics: A programmable neural network hierarchical architecture in a multi-task scenario., , , , and . Adapt. Behav., 24 (1): 27-51 (2016)