Author of the publication

A Benchmark Framework for a Computational Argumentation Competition (Demo paper)

, , , , and . Proceedings of the Fifth International Conference on Computational Models of Argumentation (COMMA'14), (September 2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Service Level Agreements for Semantic Web Agents., , and . AAAI Fall Symposium: Agents and the Semantic Web, volume FS-05-01 of AAAI Technical Report, page 47-54. AAAI Press, (2005)Representing Pure Nash Equilibria in Argumentation., , and . CoRR, (2020)Monitoring, Policing and Trust for Grid-Based Virtual Organisations, , , , , , , , , and 5 other author(s). Proceedings of the UK e-Science All Hands Meeting 2005, page 891-898. Nottingham, UK, (September 2005)Agent-Based Virtual Organisations for the Grid, , , , , , , , , and 5 other author(s). Multiagent And Grid Systems, 1 (4): 237-249 (2006)Using Sub-Optimal Plan Detection to Identify Commitment Abandonment in Discrete Environments., , and . ACM Trans. Intell. Syst. Technol., 11 (2): 23:1-23:26 (2020)Utility Functions for Human/Robot Interaction., , and . CoRR, (2022)Reexamining tf.idf based information retrieval with genetic programming. Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, page 224--234. Port Elizabeth, South Africa, South African Institute for Computer Scientists and Information Technologists, (2002)Accountability for Practical Reasoning Agents, , and . Agreement Technologies, volume 11327 of Lecture Notes in Computer Science, Springer, (2019)Is ArguMessage Effective? A Critical Evaluation of the Persuasive Message Generation System., , and . PERSUASIVE, volume 11433 of Lecture Notes in Computer Science, page 87-99. Springer, (2019)Security Analysis Using Subjective Attack Trees., , and . SECITC, volume 12596 of Lecture Notes in Computer Science, page 288-301. Springer, (2020)