Author of the publication

Multiagent Communication Security in Adversarial Settings.

, , , , , and . IAT, page 296-303. IEEE Computer Society, (2011)978-0-7695-4513-4.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Breakout: Beyond Satisfaction., , and . IJCAI, page 447-453. IJCAI/AAAI Press, (2016)Balancing exploration and exploitation in incomplete Min/Max-sum inference for distributed constraint optimization., , , , and . Auton. Agents Multi Agent Syst., 31 (5): 1165-1207 (2017)Solving non-zero sum multiagent network flow security games with attack costs., , and . AAMAS, page 879-888. IFAAMAS, (2012)Distributed constraint optimization for teams of mobile sensing agents., , , , and . Auton. Agents Multi Agent Syst., 29 (3): 495-536 (2015)Multi-Agent Path Finding for Self Interested Agents., , , , and . SOCS, page 38-46. AAAI Press, (2013)Allocating spatially distributed tasks in large, dynamic robot teams., , , , and . AAMAS, page 1245-1246. IFAAMAS, (2011)Explorative anytime local search for distributed constraint optimization., , and . Artif. Intell., (2014)Toward an understanding of the impact of software personal assistants on human organizations., , and . AAMAS, page 630-637. ACM, (2006)Personal Assistants for Human Organizations., , and . Handbook of Research on Multi-Agent Systems, IGI Global, (2009)Dynamic Multi-Agent Task Allocation with Spatial and Temporal Constraints., , and . AAAI, page 1384-1390. AAAI Press, (2014)