Author of the publication

An approach for multi-agent coordination based on semantic approximation.

, , , , and . IJIIDS, 3 (2): 163-179 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Method to Extract Informative Blocks from Web Pages., and . JCAI, page 536-539. IEEE Computer Society, (2009)An Energy-Aware Virtual Machine Scheduling Method for Cloudlets in Wireless Metropolitan Area Networks., , , , , , and . iThings/GreenCom/CPSCom/SmartData, page 517-523. IEEE, (2018)Image Digital Watermarking Technique Based on Kernel Independent Component Analysis., , , and . RSFDGrC, volume 4482 of Lecture Notes in Computer Science, page 467-474. Springer, (2007)A Timing Analysis Model for Ontology Evolutions Based on Distributed Environments., , , and . PAKDD, volume 4426 of Lecture Notes in Computer Science, page 183-192. Springer, (2007)Multifeature Fusion Detection Method for Fake Face Attack in Identity Authentication., , , and . Adv. in MM, (2018)SVM Regression and Its Application to Image Compression., , , and . ICIC (1), volume 3644 of Lecture Notes in Computer Science, page 747-756. Springer, (2005)Quantum Machine Learning for Electricity Theft Detection: an Initial Investigation., , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 204-208. IEEE, (2021)A Cost Estimation Model for Speculative Thread Partitioning., , , and . ISPA, page 66-74. IEEE Computer Society, (2010)A Data Structure Centric Method and Execution Model for Partitioning Sequential Programs into Multiple Speculative Threads., , , and . HPCC-ICESS, page 556-563. IEEE Computer Society, (2012)False Data Injection Attacks With Incomplete Network Topology Information in Smart Grid., and . IEEE Access, (2019)