Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting incompleteness in access control policies using data classification schemes., , , and . ICDIM, page 417-422. IEEE, (2010)How to Make Your Agents Fulfil Their Obligations., , and . PAAM, page 255-276. Practical Application Company Ltd., (1998)Inconsistency detection method for access control policies., , , and . IAS, page 204-209. IEEE, (2010)Feature-Interaction Resolution Using Fuzzy Policies., , , and . FIW, page 94-112. IOS Press, (2000)A High Level Visual Notation for Understanding and Designing Collaborative, Adaptive Behavior in Multiagent Systems., , , and . HICSS (6), page 180-. IEEE Computer Society, (1998)Feature-Interaction Visualisation and Resolution in an Agent Environment., , , , , and . FIW, page 135-149. IOS Press, (1998)The PADRES Distributed Publish/Subscribe System., , , and . FIW, page 12-30. IOS Press, (2005)Root cause analysis and diagnosis in SOA and cloud environments., , , and . CASCON, page 335-336. ACM, (2009)Symptom-based problem determination using log data abstraction., , , and . CASCON, page 313-326. ACM, (2010)Understanding and Defining the Behaviour of Systems of Agents with Use-Case Maps., , , , and . PAAM, page 527-528. Practical Application Company Ltd., (1997)