Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Team Formation Strategies in a Dynamic Large-Scale Environment., and . MMAS/LSMAS/CCMMS, volume 5043 of Lecture Notes in Computer Science, page 92-106. Springer, (2006)Debugging Agent Behavior in an Implemented Agent System., and . PROMAS, volume 3346 of Lecture Notes in Computer Science, page 104-125. Springer, (2004)Problem-Solving Frameworks for Sensible Agents in an Electronic Market., , , , , , and . IEA/AIE, volume 1611 of Lecture Notes in Computer Science, page 470-479. Springer, (1999)Software Architecture Correctness., and . IEEE Software, 18 (6): 64-65 (2001)Agent-Oriented Design., , and . MAAMAW, volume 1647 of Lecture Notes in Computer Science, page 28-40. Springer, (1999)Dynamic reorganization of decision-making groups., and . Agents, page 513-520. ACM, (2001)A Large Publicly Available Corpus of Website Privacy Policies Based on DMOZ., and . CODASPY, page 143-148. ACM, (2021)Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable Information., , and . TPS-ISA, page 256-262. IEEE, (2020)A Survival Game Analysis to Personal Identity Protection Strategies., , and . TPS-ISA, page 209-217. IEEE, (2020)Allocating goals and planning responsibility in dynamic sensible agent organizations., and . SMC, page 405-410. IEEE, (1998)