Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fundamental properties of attack relations in structured argumentation with priorities., and . Artif. Intell., (2018)Modular argumentation for modelling legal doctrines in common law of contract., and . Artif. Intell. Law, 17 (3): 167-182 (2009)Closure and Consistency In Logic-Associated Argumentation., and . J. Artif. Intell. Res., (2014)A Unified Framework for Representation and Development of Dialectical Proof Procedures in Argumentation., and . IJCAI, page 746-751. (2009)Towards (Probabilistic) Argumentation for Jury-based Dispute Resolution., and . COMMA, volume 216 of Frontiers in Artificial Intelligence and Applications, page 171-182. IOS Press, (2010)Towards argumentation-based contract negotiation., , and . COMMA, volume 172 of Frontiers in Artificial Intelligence and Applications, page 134-146. IOS Press, (2008)Closure and Consistency Rationalities in Logic-Based Argumentation., and . Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning, volume 6565 of Lecture Notes in Computer Science, page 33-43. Springer, (2011)Modiso: a Tool for Building Contract Dispute Resolution Systems., , and . Int. J. Artif. Intell. Tools, (2012)Representing the semantics of abstract dialectical frameworks based on arguments and attacks., and . Argument Comput., 9 (3): 249-267 (2018)Stepwise development of security protocols: a speech act-oriented approach., and . FMSE, page 33-44. ACM, (2004)