Author of the publication

Toward DAML-based policy enforcement for semantic data transformation and filtering in multi-agent systems.

, , , , , , , , , , , , and . AAMAS, page 1132-1133. ACM, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Qualitative Reasoning about Cyber Intrusions., , , , and . AAAI Workshops, volume WS-17 of AAAI Technical Report, AAAI Press, (2017)Active Perception for Cyber Intrusion Detection and Defense., , , , , , , and . AAAI Workshop: Artificial Intelligence for Cyber Security, volume WS-16-03 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.FUZZBUSTER: Towards Adaptive Immunity from Cyber Threats., , , , , and . SASO Workshops, page 137-140. IEEE Computer Society, (2011)A Model of Learning by Incremental Analogical Reasoning and Debugging.. AAAI, page 45-48. AAAI Press, (1983)Derivation of glue code for agent interoperation., , and . Agents, page 277-284. ACM, (2000)Extending Biology Models with Deep NLP over Scientific Articles., , , , and . AAAI Workshop: Knowledge Extraction from Text, volume WS-16-10 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.ITAS: A Portable, Interactive Transportation Scheduling Tool Using a Search Engine Generated from Formal Specifications., and . AIPS, page 35-44. AAAI, (1996)The Use of Object-Specific Knowledge in Natural Language Processing.. ACL, ACL, (1979)DAML-S: Web Service Description for the Semantic Web., , , , , , , , , and . ISWC, volume 2342 of Lecture Notes in Computer Science, page 348-363. Springer, (2002)Learning from Observing: Vision and POIROT - Using Metareasoning for Self Adaptation., , , , and . SASO Workshops, page 300-307. IEEE Computer Society, (2010)