Author of the publication

A Framework for Constructing Multi-agent Applications and Training Intelligent Agents.

, , , and . AOSE, volume 2935 of Lecture Notes in Computer Science, page 96-109. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Ontology-based Approach for Automatic Specification, Verification, and Validation of Software Security Requirements: Preliminary Results., , , and . QRS Companion, page 83-91. IEEE, (2021)Comparing Univariate and Multivariate Time Series Models for Technical Debt Forecasting., , , and . ICCSA (Workshops 4), volume 13380 of Lecture Notes in Computer Science, page 62-78. Springer, (2022)Application of data mining and intelligent agent technologies to concurrent engineering., , , and . CE, page 11-18. A. A. Balkema Publishers, (2003)Mertacor: a successful autonomous trading agent., , and . AAMAS, page 1191-1198. ACM, (2006)Smart Mobility Combining Public Transport with Carpooling: An iOS Application Paradigm., , , and . HPCC/SmartCity/DSS, page 1271-1278. IEEE, (2018)Efficient E-Commerce Agent Design Based on Clustering eBay Data., and . Web Intelligence/IAT Workshops, page 495-498. IEEE Computer Society, (2007)Applying the Single Responsibility Principle in Industry: Modularity Benefits and Trade-offs., , , , , , , , , and . EASE, page 347-352. ACM, (2019)Dynamic Composition of Semantic Pathways for Medical Computational Problem Solving by Means of Semantic Rules., , , , and . IEEE Trans. Inf. Technol. Biomed., 15 (2): 334-343 (2011)Cross-Project Vulnerability Prediction Based on Software Metrics and Deep Learning., , , and . ICCSA (4), volume 12252 of Lecture Notes in Computer Science, page 877-893. Springer, (2020)Intelligent policy recommendations on enterprise resource planning by the use of agent technology and data mining techniques., , and . Expert Syst. Appl., 25 (4): 589-602 (2003)