Author of the publication

Agent Communication in DAML World.

, , , , and . WRAC, volume 2564 of Lecture Notes in Computer Science, page 347-354. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authenticated Subgraph Similarity Searchin Outsourced Graph Databases., , , , and . IEEE Trans. Knowl. Data Eng., 27 (7): 1838-1860 (2015)The RFID mechanism design based on CDMA and hash function., and . IJRFITA, 3 (4): 285-293 (2011)Overcoming the local-minimum problem in training multilayer perceptrons by gradual deconvexification., , and . IJCNN, page 1-6. IEEE, (2013)A pairwise algorithm for training multilayer perceptrons with the normalized risk-averting error criterion., , and . IJCNN, page 358-365. IEEE, (2014)B2B E-Commerce Infrastructure Using Agents and Standards - A Potential Impact Analysis and Architecture., , , and . DIISM, volume 191 of IFIP Conference Proceedings, page 198-205. Kluwer, (2000)The design and realization of a Lightweight RFID Mechanism Integrating Security and Anti-collision., , , and . JSW, 6 (7): 1235-1240 (2011)ITTALKS: A Case Study in the Semantic Web and DAML., , , , , , , , , and . SWWS, page 477-494. (2001)A Framework for Bayesian Network Mapping., and . AAAI, page 1622-1623. AAAI Press / The MIT Press, (2005)A Connectionist Approach to Vertex Covering Problems., , and . Int. J. Neural Syst., 3 (1): 43-56 (1992)A connectionist approach to diagnostic problem solving using causal networks., , and . Inf. Sci., 70 (1-2): 27-48 (1993)