Author of the publication

The Common Prototyping Environment: A Framework for Software Technology Integration, Evaluation, and Transition.

, , , , and . IEEE Expert, 10 (1): 17-26 (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Model of Learning by Incremental Analogical Reasoning and Debugging.. AAAI, page 45-48. AAAI Press, (1983)FUZZBUSTER: Towards Adaptive Immunity from Cyber Threats., , , , , and . SASO Workshops, page 137-140. IEEE Computer Society, (2011)A Framework for Dynamic Information Flow in Mixed-Initiative Human/Agent Organizations., and . Appl. Intell., 20 (3): 283-298 (2004)Representation and reasoning for DAML-based policy and domain services in KAoS and nomads., , , , , , , , , and 6 other author(s). AAMAS, page 835-842. ACM, (2003)Toward DAML-based policy enforcement for semantic data transformation and filtering in multi-agent systems., , , , , , , , , and 3 other author(s). AAMAS, page 1132-1133. ACM, (2003)Qualitative Reasoning about Cyber Intrusions., , , , and . AAAI Workshops, volume WS-17 of AAAI Technical Report, AAAI Press, (2017)Active Perception for Cyber Intrusion Detection and Defense., , , , , , , and . AAAI Workshop: Artificial Intelligence for Cyber Security, volume WS-16-03 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.Integrating Agent-Based Mixed-Initiative Control with an Existing Multi-Agent Planning System., , and . ICMAS, page 389-390. IEEE Computer Society, (2000)The Many Faces of Mapping and Translation for Semantic Web Services.. WISE, page 261-268. IEEE Computer Society, (2003)DAML-Based Policy Enforcement for Semantic Data Transformation and Filtering in Multi-agent Systems., , , , , , , , , and 2 other author(s). CEEMAS, volume 2691 of Lecture Notes in Computer Science, page 122-135. Springer, (2003)