Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety., , and . AI Magazine, 33 (3): 14-28 (2012)Aspect-Oriented Approach for Testing Software Applications and Automatic Aspect Creation., and . Int. J. Softw. Eng. Knowl. Eng., 29 (10): 1379-1402 (2019)Size dependent electronic properties of silicon quantum dots - An analysis with hybrid, screened hybrid and local density functional theory., , , , , and . Comput. Phys. Commun., (2017)OnlineEducator 2.0: A Complete ITPlatform to Create, Administer, Analyze, and Transmit Online Exams., , , and . CATE, page 473-478. ACTA Press, (2004)Game-theoretic resource allocation for malicious packet detection in computer networks., , , , , and . AAMAS, page 905-912. IFAAMAS, (2012)DCOPs Meet the Real World: Exploring Unknown Reward Matrices with Applications to Mobile Sensor Networks., , , and . IJCAI, page 181-186. (2009)A Study of Phase Transitions in Security Games., , and . AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health, volume SS-12-03 of AAAI Technical Report, AAAI, (2012)When should there be a "Me" in "Team"?: distributed multi-agent optimization under uncertainty., , , , and . AAMAS, page 109-116. IFAAMAS, (2010)Dynamic allocation of security resources for protecting public events., , and . AAMAS, page 1473-1474. IFAAMAS/ACM, (2014)CoFFEE: Corrections For Formation Energy and Eigenvalues for charged defect simulations., and . Comput. Phys. Commun., (2018)