Author of the publication

Electronic institutions and neural computing providing law-compliance privacy for trusting agents.

, , , and . J. Appl. Log., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Electronic institutions and neural computing providing law-compliance privacy for trusting agents., , , and . J. Appl. Log., (2017)Privacy Protection in Trust Models for Agent Societies., , , and . SOCO-CISIS-ICEUTE, volume 299 of Advances in Intelligent Systems and Computing, page 135-144. Springer, (2014)Costs of Protecting Privacy in Agent Trust Relationships., , and . PAAMS (Workshops), volume 524 of Communications in Computer and Information Science, page 179-190. Springer, (2015)Privacy Protection in Trust Models for Agent Societies., , , and . SOCO-CISIS-ICEUTE, volume 299 of Advances in Intelligent Systems and Computing, page 135-144. Springer, (2014)Ambient Intelligence: Applications and Privacy Policies., , , and . PAAMS (Workshops), volume 430 of Communications in Computer and Information Science, page 191-201. Springer, (2014)Real Time Image Segmentation Using an Adaptive Thresholding Approach., , , and . CAEPIA, volume 4177 of Lecture Notes in Computer Science, page 389-398. Springer, (2005)Morphological Applications for Maps Construction in Path Planning Tasks., , , , , and . CIARP, volume 2905 of Lecture Notes in Computer Science, page 651-658. Springer, (2003)Selection of an Automated Morphological Gradient Threshold for Image Segmentation., , , , and . CIARP, volume 3287 of Lecture Notes in Computer Science, page 92-99. Springer, (2004)Theorical review of the Teaching of Mathematics in Student with Visual Functional Diversity., , and . TEEM, page 201-208. ACM, (2019)Evaluating Explanations for Software Patches Generated by Large Language Models., , , , , , , , and . SSBSE, volume 14415 of Lecture Notes in Computer Science, page 147-152. Springer, (2023)