Author of the publication

SA-IGA: a multiagent reinforcement learning method towards socially optimal outcomes.

, , , , , , and . Autonomous Agents and Multi-Agent Systems, 33 (4): 403-429 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Lifecycle Framework for Semantic Web Service Annotation Assessment and Optimization., , , , , and . ICWS, page 361-368. IEEE Computer Society, (2015)Outage Probability Analysis of DF Relay Networks with RF Energy Harvesting., , , , and . GLOBECOM, page 1-5. IEEE, (2015)The achievable capacity scaling laws of 3D cognitive radio networks., , , , , and . ICC, page 1-6. IEEE, (2016)Research on Cognitive Wireless Networks: Theory, Key Technologies and testbed., , and . CrownCom, page 291-295. ICST / IEEE, (2011)National standardization activities within China., , and . CrownCom, page 126-130. ICST / IEEE, (2011)Analysis of Improved Cyclostationary Detector with Multiple Antennas over Fading Channels., , and . JNW, 8 (11): 2459-2466 (2013)A new design of wearable token system for mobile device security., , , , and . IEEE Trans. Consumer Electronics, 54 (4): 1784-1789 (2008)Architecture Security Evaluation Method Based on Security of the Components., , , , , and . APSEC (1), page 523-528. IEEE Computer Society, (2013)978-1-4799-2143-0.Analyzing Distribution of Implicit Semantic Information in Web Services., , and . COMPSAC Workshops, page 415-420. IEEE Computer Society, (2013)A Three-Dimensional Model for Software Security Evaluation., , , , , and . TASE, page 34-41. IEEE Computer Society, (2014)