Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding victim-enabled identity theft., , and . PST, page 196-202. IEEE, (2016)Debugging Agent Behavior in an Implemented Agent System., and . PROMAS, volume 3346 of Lecture Notes in Computer Science, page 104-125. Springer, (2004)Agent-Oriented Design., , and . MAAMAW, volume 1647 of Lecture Notes in Computer Science, page 28-40. Springer, (1999)Problem-Solving Frameworks for Sensible Agents in an Electronic Market., , , , , , and . IEA/AIE, volume 1611 of Lecture Notes in Computer Science, page 470-479. Springer, (1999)Team Formation Strategies in a Dynamic Large-Scale Environment., and . MMAS/LSMAS/CCMMS, volume 5043 of Lecture Notes in Computer Science, page 92-106. Springer, (2006)Allocating goals and planning responsibility in dynamic sensible agent organizations., and . SMC, page 405-410. IEEE, (1998)Evaluating dynamic correctness properties of domain reference architectures., , and . J. Syst. Softw., 68 (3): 217-231 (2003)Systemic Reciprocal Rewards: Motivating Expert Participation in Online Communities with a Novel Class of Incentives., and . Int. J. Agent Technol. Syst., 6 (2): 30-50 (2014)Software Architecture Correctness., and . IEEE Software, 18 (6): 64-65 (2001)Arcade: early dynamic property evaluation of requirements using partitioned software architecture models., , , and . Requir. Eng., 8 (4): 222-235 (2003)