Author of the publication

Probabilistic Award Strategy for Contract Net Protocol in Massively Multi-agent Systems.

, , and . ICAART (2), page 165-171. INSTICC Press, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting possible conflicts in hierarchical planning for multi-agent systems., , , , and . AAMAS, page 813-820. ACM, (2005)An image processing approach to traffic anomaly detection., , and . AINTEC, page 17-26. ACM, (2008)A Visualization Tool for Exploring Multi-scale Network Traffic Anomalies., , and . J. Networks, 6 (4): 577-586 (2011)Fluctuated peer selection policy and its performance in large-scale multi-agent systems., , , , , and . Web Intell. Agent Syst., 8 (3): 255-268 (2010)Policy-based BGP-control architecture for inter-AS routing adjustment., , , and . Comput. Commun., 31 (13): 2996-3002 (2008)Performance variation due to interference among a large number of self-interested agents., , , and . IEEE Congress on Evolutionary Computation, page 766-773. IEEE, (2007)A Portable Time Synchronization Method using eBPF., , and . CANDARW, page 20-25. IEEE, (2022)The Impact of Network Model on Performance of Load-balancing., , , , , and . Emergent Intelligence of Networked Agents, volume 56 of Studies in Computational Intelligence, Springer, (2007)Reusing Coordination and Negotiation Strategies in Multi-Agent Systems for Ubiquitous Network Environment., , , , , and . AAMAS, page 496-503. IEEE Computer Society, (2004)Dependency of Network Structures in Agent Selection and Deployment., , , , , and . IAT, page 37-44. IEEE Computer Society, (2006)