Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding victim-enabled identity theft., , and . PST, page 196-202. IEEE, (2016)Software Architecture Correctness., and . IEEE Software, 18 (6): 64-65 (2001)Agent-Oriented Design., , and . MAAMAW, volume 1647 of Lecture Notes in Computer Science, page 28-40. Springer, (1999)Debugging Agent Behavior in an Implemented Agent System., and . PROMAS, volume 3346 of Lecture Notes in Computer Science, page 104-125. Springer, (2004)Problem-Solving Frameworks for Sensible Agents in an Electronic Market., , , , , , and . IEA/AIE, volume 1611 of Lecture Notes in Computer Science, page 470-479. Springer, (1999)Team Formation Strategies in a Dynamic Large-Scale Environment., and . MMAS/LSMAS/CCMMS, volume 5043 of Lecture Notes in Computer Science, page 92-106. Springer, (2006)Allocating goals and planning responsibility in dynamic sensible agent organizations., and . SMC, page 405-410. IEEE, (1998)Agent Technology Portfolio Manager., , , , and . SEKE, page 37-44. (2004)Architectural Model for Designing Agent-based System., , and . SEKE, page 753-760. (2005)Evaluating dynamic correctness properties of domain reference architectures., , and . J. Syst. Softw., 68 (3): 217-231 (2003)