Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-agent approach to network intrusion detection., , , , , and . AAMAS (Demos), page 1695-1696. IFAAMAS, (2008)Game-theoretic Approach to Adversarial Plan Recognition., , , , and . ECAI, volume 242 of Frontiers in Artificial Intelligence and Applications, page 546-551. IOS Press, (2012)Incrementally Refined Acquaintance Model for Distributed Planning and Resource Allocation in Semi-trusted Environments., , and . Web Intelligence/IAT Workshops, page 391-394. IEEE Computer Society, (2007)Adversarial Behavior in Multi-agent Systems., , and . CEEMAS, volume 3690 of Lecture Notes in Computer Science, page 470-479. Springer, (2005)Optimizing Agents Operation in Partially Inaccessible and Disruptive Environment., , , and . IAT, page 140-143. IEEE Computer Society, (2005)Agent subset adversarial search for complex non-cooperative domains., , , and . CIG, page 211-218. IEEE, (2010)Understanding Future Technologies through Agent-Based Simulation.. ICAART (1), page 11. SciTePress, (2019)Content-Based Privacy Management on the Social Web., , , and . Web Intelligence/IAT Workshops, page 277-280. IEEE Computer Society, (2011)978-0-7695-4513-4.Contract Observation in Web Services Environments., , , and . SOCASE, volume 5907 of Lecture Notes in Computer Science, page 1-11. Springer, (2009)Alarm Root Cause Detection System., , , and . BASYS, volume 159 of IFIP, page 109-116. Springer, (2004)