Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Manipulation of Weighted Voting Games and the Effect of Quota., and . ICAART (Revised Selected Papers), volume 271 of Communications in Computer and Information Science, page 413-428. Springer, (2011)Improved Heuristic for Manipulation of Second-order Copeland Elections., and . GCAI, volume 50 of EPiC Series in Computing, page 162-174. EasyChair, (2017)False-Name Manipulation in Weighted Voting Games: Empirical and Theoretical Analysis., and . Comput. Intell., 33 (3): 478-506 (2017)Efficient Exploration of Environments Using Stochastic Local Search.. ICAART (1), page 244-251. SciTePress, (2017)Annexations and Merging in Weighted Voting Games - The Extent of Susceptibility of Power Indices., and . ICAART (2), page 124-133. SciTePress, (2011)Characterization of Normal and Abnormal Activities in a Cyber Operation Environment., and . ICAART (3), page 800-806. SCITEPRESS, (2024)A Search-based Approach to Annexation and Merging in Weighted Voting Games., and . ICAART (2), page 44-53. SciTePress, (2012)Manipulation of Weighted Voting Games via Annexation and Merging., and . ICAART (Revised Selected Papers), volume 358 of Communications in Computer and Information Science, page 364-378. Springer, (2012)Overlapping Coalition Formation in Multi-sensor Networks.. FLAIRS, page 194-197. AAAI Press, (2017)CyberReco: ~Cybersecurity Workforce Readiness Recommender System.. FLAIRS, AAAI Press, (2023)