Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining Cognitive with Computational Trust Reasoning., and . AAMAS-TRUST, volume 5396 of Lecture Notes in Computer Science, page 99-111. Springer, (2008)Dynamic information source selection for intrusion detection systems., , , , , and . AAMAS (2), page 1009-1016. IFAAMAS, (2009)Formalizing Excusableness of Failures in Multi-Agent Systems., and . PRIMA, volume 5044 of Lecture Notes in Computer Science, page 122-133. Springer, (2007)Assessing the Impact of Informedness on a Consultant's Profit, and . CoRR, (2009)Tuning Evidence-Based Trust Models., and . CSE (3), page 92-99. IEEE Computer Society, (2009)Collusion Detection for Grid Computing., and . CCGRID, page 412-419. IEEE Computer Society, (2009)On the Profitability of Incompetence., and . MABS, volume 6532 of Lecture Notes in Computer Science, page 76-92. Springer, (2010)Reliable information acquisition in the presence of malicious sources.. University of Luxembourg, (2010)base-search.net (ftunivluxembourg:oai:orbilu.uni.lu:10993/15631).