Author of the publication

Contract-Based Distributed Scheduling for Distributed Processing.

, and . AAAI Workshop: Constraints & Agents, page 118-128. AAAI Press, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Epsilon-Safe Planning, and . CoRR, (2013)Expressive Planning and Explicit Knowledge., and . AIPS, page 110-117. AAAI, (1996)PRONTOE: An Ontology Editor for Domain Experts., , , , and . IC3K, volume 454 of Communications in Computer and Information Science, page 153-167. Springer, (2013)Automated Vulnerability Analysis Using AI Planning., , , and . AAAI Spring Symposium: AI Technologies for Homeland Security, page 46-53. AAAI, (2005)PRONTOE - A Case Study for Developing Ontologies for Operations., , , , and . KEOD, page 17-25. SciTePress, (2013)A Constraint-Based Scheduler for Batch Manufacturing., and . IEEE Expert, 12 (1): 49-56 (1997)Conditional Linear Planning., and . AIPS, page 80-85. AAAI, (1994)Contract-Based Distributed Scheduling for Distributed Processing., and . AAAI Workshop: Constraints & Agents, page 118-128. AAAI Press, (1997)Collaborative Filtering for Community Threats., , , and . AAAI Spring Symposium: AI Technologies for Homeland Security, page 130-132. AAAI, (2005)Course of Action Generation for Cyber Security Using Classical Planning., , , and . ICAPS, page 12-21. AAAI, (2005)