From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mismorphism: a semiotic model of computer security circumvention (poster abstract)., , , и . HotSoS, стр. 25:1-25:2. ACM, (2015)Supporting plan authoring and analysis., и . IUI, стр. 109-116. ACM, (2003)Object-Oriented System Modeling with OMT., , , и . OOPSLA, стр. 359-376. ACM, (1992)SIGPLAN Notices 27(10).Massive Multi-agent Data-Driven Simulations of the GitHub Ecosystem., , , , , , , , , и 5 other автор(ы). PAAMS, том 11523 из Lecture Notes in Computer Science, стр. 3-15. Springer, (2019)Visualizing Multiple Levels and Dimensions of Social Network Properties., , и . Handbook of Human Centric Visualization, Springer, (2014)Analogical Replay for Efficient Conditional Planning., и . AAAI/IAAI, стр. 668-673. AAAI Press / The MIT Press, (1997)The Effect of Graph Layout on Inference from Social Network Data., , и . GD, том 1027 из Lecture Notes in Computer Science, стр. 40-51. Springer, (1995)A Complete Bidirectional Planner., и . AIPS, стр. 78-85. AAAI, (1998)Eyes on URLs: Relating Visual Behavior to Safety Decisions., , , , , , и . ETRA, стр. 19:1-19:10. ACM, (2020)Planning with External Events.. UAI, стр. 94-101. Morgan Kaufmann, (1994)