Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Location-Aware Services and Interfaces in Smart Homes Using Multiagent Systems., , , , , , , and . PSC, page 104-110. CSREA Press, (2005)Avoiding the prisoner's dilemma in auction-based negotiations for highly rugged utility spaces., , , and . AAMAS, page 425-432. IFAAMAS, (2010)JPEG2000 Images Protection Sent to Mobile Devices., , , and . ICUC, volume 208 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)Channel Selection in Uncoordinated IEEE 802.11 Networks Using Graph Coloring., , , , and . Sensors, 23 (13): 5932 (July 2023)Applying an Unified Access Control for IoT-based Intelligent Agent Systems., , , , and . SOCA, page 247-251. IEEE Computer Society, (2015)Effect of Anticipatory Stigmergy on Decentralized Traffic Congestion Control., , , , and . PRIMA, volume 7455 of Lecture Notes in Computer Science, page 214-227. Springer, (2012)Using a scenario generation framework for education on system and internet security., , , and . EDUCON, page 1-7. IEEE, (2012)Simulation of Coordinated Anticipatory Vehicle Routing Strategies on MATSim., , and . PRIMA Workshops, volume 7580 of Lecture Notes in Computer Science, page 90-108. Springer, (2011)Detecting and defeating advanced man-in-the-middle attacks against TLS., , , , , and . CyCon, page 209-221. IEEE, (2014)A Distributed, Multi-Agent Approach to Reactive Network Resilience., , , , and . AAMAS, page 1044-1053. ACM, (2017)