Author of the publication

An Empirical Evaluation of a Sentinel Based Approach to Exception Diagnosis in Multi-Agent Systems.

, , , , and . AINA (1), page 379-386. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study on Representation of QoS in UDDI for Web Services Composition., , , and . CISIS, page 423-428. IEEE Computer Society, (2008)An adaptable optimizer for green component design., , , , and . Inf. Syst. E Bus. Manag., 13 (2): 193-210 (2015)Integrating Semantic Web and Object-Oriented Programming for Cooperative Design., , and . J. Univers. Comput. Sci., 15 (9): 1970-1990 (2009)Identifying the Attack Sources of Botnets for a Renewable Energy Management System by Using a Revised Locust Swarm Optimisation Scheme., , , , and . Symmetry, 13 (7): 1295 (2021)Enhancing Computational Thinking Capability of Preschool Children by Game-based Smart Toys., , , , and . Electron. Commer. Res. Appl., (2020)Special Issue on techniques to support collaborative engineering environments., and . Adv. Eng. Informatics, 21 (2): 181 (2007)Dynamic fine-tuning stacked auto-encoder neural network for weather forecast., , , , and . Future Gener. Comput. Syst., (2018)Combining Cooperative and Non-Cooperative Automated Negotiations., , , and . Inf. Syst. Frontiers, 7 (4-5): 391-404 (2005)An Effective Hybrid Genetic Algorithm and Variable Neighborhood Search for Integrated Process Planning and Scheduling in a Packaging Machine Workshop., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 49 (10): 1933-1945 (2019)Using ontologies to perform threat analysis and develop defensive strategies for mobile security., , , and . Inf. Technol. Manag., 18 (1): 1-25 (2017)