Author of the publication

Embedding the Trust Degrees of Agents in Abstract Argumentation.

, , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 737-744. IOS Press, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and effective RFID data warehousing., , , and . IDEAS, page 251-258. ACM, (2009)Offline cleaning of RFID trajectory data., , , and . SSDBM, page 5:1-5:12. ACM, (2014)Binary-Tree Histograms with Tree Indices., , , and . DEXA, volume 2453 of Lecture Notes in Computer Science, page 861-870. Springer, (2002)Enabling OLAP in mobile environments via intelligent data cube compression techniques., , and . J. Intell. Inf. Syst., 33 (2): 95-143 (2009)Computing Extensions' Probabilities in Probabilistic Abstract Argumentation: Beyond Independence., , and . ECAI, volume 285 of Frontiers in Artificial Intelligence and Applications, page 1588-1589. IOS Press, (2016)On the Interpretation of Traces of Low Level Events in Business Process Logs., , , , and . SEBD, volume 2161 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)A Quad-Tree Based Multiresolution Approach for Two-dimensional Summary Data., , , and . SSDBM, page 127-140. IEEE Computer Society, (2003)A compression-based framework for the efficient analysis of business process logs., , , , and . SSDBM, page 6:1-6:12. ACM, (2015)Querying and Repairing Inconsistent XML Data., , , and . WISE, volume 3806 of Lecture Notes in Computer Science, page 175-188. Springer, (2005)Monitoring Web Information Changes., , and . ITCC, page 421-425. IEEE Computer Society, (2001)