Author of the publication

A Heuristics-Based Pruning Technique for Argumentation Trees.

, , , and . SUM, volume 6929 of Lecture Notes in Computer Science, page 177-190. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A taxonomy approach for multi-context trust: Formalization and implementation., , and . Expert Syst. Appl., (2019)A survey of different approaches to support in argumentation systems., , , and . Knowl. Eng. Rev., 29 (5): 513-550 (2014)Towards Evidence Retrieval Cost Reduction in Abstract Argumentation Frameworks with Fallible Evidence., , , and . J. Artif. Intell. Res., (2022)Belief dynamics and defeasible argumentation in rational agents., , and . NMR, page 164-170. (2004)Computation with varied-strength attacks in abstract argumentation frameworks., , , and . COMMA, volume 216 of Frontiers in Artificial Intelligence and Applications, page 207-218. IOS Press, (2010)Defeasible Logic Programming: An Argumentative Approach, and . CoRR, (2003)A structured argumentation system with backing and undercutting., , and . Eng. Appl. Artif. Intell., (2016)An Application of Defeasible Logic Programming to Decision Making in a Robotic Environment., , , and . LPNMR, volume 4483 of Lecture Notes in Computer Science, page 297-302. Springer, (2007)On Defense Strength of Blocking Defeaters in Admissible Sets., , and . KSEM, volume 4798 of Lecture Notes in Computer Science, page 140-152. Springer, (2007)Argument Theory Change: Revision Upon Warrant., , , , and . COMMA, volume 172 of Frontiers in Artificial Intelligence and Applications, page 336-347. IOS Press, (2008)