Author of the publication

Supporting Formation and Operation of Virtual Organisations in a Grid Environment

, , , , , , , , , , , , , , , , , and . Proceedings of the UK e-Science All Hands Meeting 2004, page 376-383. Nottingham, UK, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Service Level Agreements for Semantic Web Agents., , and . AAAI Fall Symposium: Agents and the Semantic Web, volume FS-05-01 of AAAI Technical Report, page 47-54. AAAI Press, (2005)Accountability for Practical Reasoning Agents, , and . Agreement Technologies, volume 11327 of Lecture Notes in Computer Science, Springer, (2019)Is ArguMessage Effective? A Critical Evaluation of the Persuasive Message Generation System., , and . PERSUASIVE, volume 11433 of Lecture Notes in Computer Science, page 87-99. Springer, (2019)Monitoring, Policing and Trust for Grid-Based Virtual Organisations, , , , , , , , , and 5 other author(s). Proceedings of the UK e-Science All Hands Meeting 2005, page 891-898. Nottingham, UK, (September 2005)Agent-Based Virtual Organisations for the Grid, , , , , , , , , and 5 other author(s). Multiagent And Grid Systems, 1 (4): 237-249 (2006)Reexamining tf.idf based information retrieval with genetic programming. Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, page 224--234. Port Elizabeth, South Africa, South African Institute for Computer Scientists and Information Technologists, (2002)Utility Functions for Human/Robot Interaction., , and . CoRR, (2022)Representing Pure Nash Equilibria in Argumentation., , and . CoRR, (2020)Using Sub-Optimal Plan Detection to Identify Commitment Abandonment in Discrete Environments., , and . ACM Trans. Intell. Syst. Technol., 11 (2): 23:1-23:26 (2020)Security Analysis Using Subjective Attack Trees., , and . SECITC, volume 12596 of Lecture Notes in Computer Science, page 288-301. Springer, (2020)