Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monitoring Teams by Overhearing: A Multi-Agent Plan-Recognition Approach, , and . CoRR, (2011)Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties., , , , , and . AAMAS (1), page 369-376. IFAAMAS, (2009)Sensitivity analysis for distributed optimization with resource constraints., , , and . AAMAS (1), page 633-640. IFAAMAS, (2009)Every team deserves a second chance: an extended study on predicting team performance., , , and . Auton. Agents Multi Agent Syst., 31 (5): 1003-1054 (2017)When Players Affect Target Values: Modeling and Solving Dynamic Partially Observable Security Games., , , and . GameSec, volume 11836 of Lecture Notes in Computer Science, page 542-562. Springer, (2019)Multi-objective optimization for security games., , , , and . AAMAS, page 863-870. IFAAMAS, (2012)A robust approach to addressing human adversaries in security games., , , , , and . AAMAS, page 1297-1298. IFAAMAS, (2012)Electric Elves: Applying Agent Technology to Support Human Organizations., , , , , , , and . IAAI, page 51-58. AAAI, (2001)SAVES: a sustainable multiagent application to conserve building energy considering occupants., , , , , , , , , and . AAMAS, page 21-28. IFAAMAS, (2012)Signaling in Bayesian Stackelberg Games., , , , and . AAMAS, page 150-158. ACM, (2016)