From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Extraction of Natural Language Requirements from Breach Reports Using Event Inference., , и . AIRE@RE, стр. 22-28. IEEE, (2018)Formal Understanding of Tradeoffs among Liveness and Safety Requirements., , и . RE Workshops, стр. 17-18. IEEE Computer Society, (2016)CONAN: a heuristic strategy for concurrent negotiating agents., , и . AAMAS, стр. 1585-1586. IFAAMAS/ACM, (2014)Diagnosing commitments: delegation revisited., и . AAMAS, стр. 1175-1176. IFAAMAS, (2011)Toward a Normative Approach for Resilient Multiagent Systems: A Summary., , , , и . AAMAS, стр. 2836-2838. International Foundation for Autonomous Agents and Multiagent Systems / ACM, (2024)Toward a normative approach for forensicability., , и . HotSoS, стр. 65-67. ACM, (2016)Age Appropriate Design: Assessment of TikTok, Twitch, and YouTube Kids., , и . CoRR, (2022)NANE: Identifying Misuse Cases Using Temporal Norm Enactments., , и . RE, стр. 136-145. IEEE Computer Society, (2016)Kont: Computing Tradeoffs in Normative Multiagent Systems., , и . AAAI, стр. 3006-3012. AAAI Press, (2017)Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers., , , , , , , , , и 1 other автор(ы). HotSoS, стр. 13-23. ACM, (2017)