Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting possible conflicts in hierarchical planning for multi-agent systems., , , , and . AAMAS, page 813-820. ACM, (2005)Fluctuated peer selection policy and its performance in large-scale multi-agent systems., , , , , and . Web Intell. Agent Syst., 8 (3): 255-268 (2010)Policy-based BGP-control architecture for inter-AS routing adjustment., , , and . Comput. Commun., 31 (13): 2996-3002 (2008)A Visualization Tool for Exploring Multi-scale Network Traffic Anomalies., , and . J. Networks, 6 (4): 577-586 (2011)An image processing approach to traffic anomaly detection., , and . AINTEC, page 17-26. ACM, (2008)Capability-Based Egress Network Access Control for Transferring Access Rights., , , , and . ICITA (2), page 488-495. IEEE Computer Society, (2005)The Impact of Network Model on Performance of Load-balancing., , , , , and . Emergent Intelligence of Networked Agents, volume 56 of Studies in Computational Intelligence, Springer, (2007)Reusing Coordination and Negotiation Strategies in Multi-Agent Systems for Ubiquitous Network Environment., , , , , and . AAMAS, page 496-503. IEEE Computer Society, (2004)Dependency of Network Structures in Agent Selection and Deployment., , , , , and . IAT, page 37-44. IEEE Computer Society, (2006)Performance variation due to interference among a large number of self-interested agents., , , and . IEEE Congress on Evolutionary Computation, page 766-773. IEEE, (2007)