Author of the publication

Token Approach for Role Allocation in Extreme Teams: Analysis and Experimental Evaluation.

, , , and . WETICE, page 397-402. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Techniques and Directions for Building Very Large Agent Teams, , and . International Conference on Integration of Knowledge Intensive Multi-Agent Systems, page 79-84. (April 2005)The DEFACTO System: Training Tool for Incident Commanders., , , , and . AAAI, page 1555-1562. AAAI Press / The MIT Press, (2005)Engineering characteristics of autonomous agent architectures., and . J. Exp. Theor. Artif. Intell., 12 (2): 191-212 (2000)Creating complex actors with EASE., and . Agents, page 142-143. ACM, (2000)Why the elf acted autonomously: towards a theory of adjustable autonomy., , and . AAMAS, page 857-864. ACM, (2002)Safety in the Context of Coordination via Adjustable Autonomy., , and . Safety and Security in Multiagent Systems, volume 4324 of Lecture Notes in Computer Science, Springer, (2009)Making Adjustable Autonomy Easier with Teamwork., and . PRICAI Workshops, volume 2112 of Lecture Notes in Computer Science, page 339-352. Springer, (2000)Headless Chickens III., , , , and . RoboCup, volume 1856 of Lecture Notes in Computer Science, page 576-579. Springer, (1999)SUAVE: Integrating UAV video using a 3D model., , , , , , and . SMC, page 2865-2869. IEEE, (2011)Personal Assistants for Human Organizations., , and . Handbook of Research on Multi-Agent Systems, IGI Global, (2009)