Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Preserving Implementation of the Max-Sum Algorithm and its Variants., , and . J. Artif. Intell. Res., (2017)Preserving Privacy in Region Optimal DCOP Algorithms., , and . IJCAI, page 496-502. IJCAI/AAAI Press, (2016)Partially concurrent open shop scheduling with integral preemptions., , and . Ann. Oper. Res., 259 (1-2): 157-171 (2017)Privacy preserving region optimal algorithms for symmetric and asymmetric DCOPs., , , and . Artif. Intell., (2019)Evaluation of Neural Networks Defenses and Attacks using NDCG and Reciprocal Rank Metrics., , and . CoRR, (2022)Assigning Suppliers to Meet a Deadline., , and . SOCS, page 170-171. AAAI Press, (2019)CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities., , , and . Web Intelligence, page 34-41. IEEE Computer Society, (2009)Reentrant flow shop with identical jobs and makespan criterion., , , and . Int. J. Prod. Res., 61 (1): 183-197 (2023)Privacy Issues with Sharing and Computing Reputation across Communities., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 1 (4): 16-34 (2010)Manipulating Recommendation Lists by Global Considerations., , , , and . ICAART (2), page 135-142. INSTICC Press, (2010)