Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monitoring Teams by Overhearing: A Multi-Agent Plan-Recognition Approach, , and . CoRR, (2011)Towards Adjustable Autonomy for the Real World., , and . J. Artif. Intell. Res., (2002)Every team deserves a second chance: an extended study on predicting team performance., , , and . Auton. Agents Multi Agent Syst., 31 (5): 1003-1054 (2017)When Players Affect Target Values: Modeling and Solving Dynamic Partially Observable Security Games., , , and . GameSec, volume 11836 of Lecture Notes in Computer Science, page 542-562. Springer, (2019)Multi-objective optimization for security games., , , , and . AAMAS, page 863-870. IFAAMAS, (2012)Building THINC: user incentivization and meeting rescheduling for energy savings., , , , and . AAMAS, page 925-932. IFAAMAS/ACM, (2014)Enhancing Poaching Predictions for Under-Resourced Wildlife Conservation Parks Using Remote Sensing Imagery., , , , , and . CoRR, (2020)An Efficient Heuristic for Security against Multiple Adversaries in Stackelberg Games., , , , and . AAAI Spring Symposium: Game Theoretic and Decision Theoretic Agents, page 38-46. AAAI, (2007)SPIDER Attack on a Network of POMDPs: Towards Quality Bounded Solutions., , , and . AAAI Spring Symposium: Game Theoretic and Decision Theoretic Agents, page 68-75. AAAI, (2007)Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up., , and . AAMAS, page 997-1004. IFAAMAS, (2011)