Author of the publication

Security and Robustness for Collaborative Monitors.

, , and . COIN@AAMAS/IJCAI, volume 9628 of Lecture Notes in Computer Science, page 376-395. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method for Efficient Argument-Based Inquiry., , and . FQAS, volume 11529 of Lecture Notes in Computer Science, page 114-125. Springer, (2019)Organizational Replication Using Inheritance., , and . CSCS, page 300-306. IEEE, (2015)Approximating stability for applied argument-based inquiry., , , and . Intell. Syst. Appl., (2022)Specifications for Peer-to-Peer Argumentation Dialogues., and . PRIMA, volume 10621 of Lecture Notes in Computer Science, page 227-244. Springer, (2017)Argumentation-Driven Information Extraction for Online Crime Reports., , , and . CIKM Workshops, volume 2482 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Design patterns for multi-agent programming., and . IJAOSE, 5 (2/3): 167-202 (2016)Norms in Distributed Organizations., , and . COIN@AAMAS/PRIMA, volume 8386 of Lecture Notes in Computer Science, page 120-135. Springer, (2013)AI-Assisted Message Processing for the Netherlands National Police., , and . AIAS@ICAIL, volume 2471 of CEUR Workshop Proceedings, page 10-13. CEUR-WS.org, (2019)From Multi-Agent Programming to Object Oriented Design Patterns., and . EMAS@AAMAS, volume 8758 of Lecture Notes in Computer Science, page 204-226. Springer, (2014)Norm Monitoring Through Observation Sharing., , and . ECSI, volume 1283 of CEUR Workshop Proceedings, page 291-304. CEUR-WS.org, (2014)