Author of the publication

A Bayesian Approach to Norm Identification.

, , , and . ECAI, volume 285 of Frontiers in Artificial Intelligence and Applications, page 622-629. IOS Press, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic BDI Plan Recognition from Process Execution Logs and Effect Logs., , , , , and . EMAS@AAMAS, volume 8245 of Lecture Notes in Computer Science, page 274-291. Springer, (2013)An Agent-Enhanced Workflow Management System., , , and . KES (4), volume 3684 of Lecture Notes in Computer Science, page 215-220. Springer, (2005)Social Norm Recommendation for Virtual Agent Societies., , and . PRIMA, volume 8291 of Lecture Notes in Computer Science, page 308-323. Springer, (2013)Exploring Research Interest in Stack Overflow - A Systematic Mapping Study and Quality Evaluation., , and . CoRR, (2020)Multi-level Analysis of Peace and Conflict Data in GDELT., , , and . MLSDA@PRICAI, page 33. ACM, (2014)Externalization of software behavior by the mining of norms., , , and . MSR, page 223-234. ACM, (2016)Agent-based integration of Web Services with Workflow Management Systems., , , and . AAMAS, page 1345-1346. ACM, (2005)An Agent-Based Simulation of Employing Social Norms in Energy Conservation in Households., , and . PRIMA Workshops, volume 7580 of Lecture Notes in Computer Science, page 16-31. Springer, (2011)Gossip-Based Self-organising Open Agent Societies., , , and . PRIMA, volume 7057 of Lecture Notes in Computer Science, page 105-120. Springer, (2010)An agent-based simulation for restricting exploitation in electronic societies through social mechanisms., , , and . AI Soc., 30 (3): 345-358 (2015)