Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-agent approach to network intrusion detection., , , , , and . AAMAS (Demos), page 1695-1696. IFAAMAS, (2008)ExPlanTech: Multiagent Support for Manufacturing Decision Making., , and . IEEE Intell. Syst., 20 (1): 67-74 (2005)Planning of Diverse Trajectories., , and . ICAART (2), page 120-129. SciTePress, (2013)Anytime algorithms for multi-agent visibility-based pursuit-evasion games., , and . AAMAS, page 1301-1302. IFAAMAS, (2012)AgentPolis: towards a platform for fully agent-based modeling of multi-modal transportation (demonstration)., , , , , , , and . AAMAS, page 1501-1502. IFAAMAS, (2012)Agents vs. pirates: multi-agent simulation and optimization to fight maritime piracy., , , and . AAMAS, page 37-44. IFAAMAS, (2012)Combining Incremental Strategy Generation and Branch and Bound Search for Computing Maxmin Strategies in Imperfect Recall Games., , and . AAMAS, page 902-910. ACM, (2017)Adaptive Multiagent System for Network Traffic Monitoring., , , , , and . IEEE Intelligent Systems, 24 (3): 16-25 (2009)A-Globe: Agent Platform with Inaccessibility and Mobility Support., , and . CIA, volume 3191 of Lecture Notes in Computer Science, page 199-214. Springer, (2004)Meta-reasoning for Agents' Private Knowledge Detection., , and . CIA, volume 2782 of Lecture Notes in Computer Science, page 316-323. Springer, (2003)