Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Analysis of Meeting Protocols., , , and . MABS, volume 3415 of Lecture Notes in Computer Science, page 114-129. Springer, (2004)Ladders of success: an empirical approach to trust., and . AAMAS, page 1168-1169. ACM, (2003)Clinical experience sharing by similar case retrieval., , , , , , , and . MIIRH@ACM Multimedia, page 67-74. ACM, (2013)Cooperative Sign Language Tutoring: A Multiagent Approach., , , and . ESAW, volume 5881 of Lecture Notes in Computer Science, page 213-228. Springer, (2009)Detecting Conflicts in Commitments., and . DALT, volume 7169 of Lecture Notes in Computer Science, page 51-66. Springer, (2011)Service Graphs for Building Trust., and . CoopIS/DOA/ODBASE (1), volume 3290 of Lecture Notes in Computer Science, page 509-525. Springer, (2004)Improving Self-organized Resource Allocation with Effective Communication., and . AP2PC, volume 6573 of Lecture Notes in Computer Science, page 35-46. Springer, (2008)Agents for Social Media., and . IEEE Internet Comput., 21 (6): 5-7 (2017)The fifth International conference on autonomous agents: an E-commerce perspective.. SIGecom Exch., 2 (2): 39-41 (2001)Strategies for Privacy Negotiation in Online Social Networks., , and . PrAISe@ECAI, page 2:1-2:8. ACM, (2016)