Author of the publication

Negotiation Paradigms for E-Commerce Agents using Knowledge Beads Methodology.

, , and . CW, page 279-287. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simplifying complex CAD geometry with conservative bounding contours., , and . ICRA, page 2503-2508. IEEE, (1997)Guanxi in the Chinese Web., , and . CSE (4), page 9-17. IEEE Computer Society, (2009)On Designing a Flexible E-Payment System with Fraud Detection Capability., , and . CEC, page 236-243. IEEE Computer Society, (2004)An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs., , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 315-328. Springer, (2014)Shape-induced ultrahigh magnetic anisotropy and ferromagnetic resonance frequency of micropatterned thin Permalloy films, , , , and . Journal of Applied Physics, (2006)Integrated solenoid inductors with patterned, sputter-deposited Cr/Fe/sub 10/Co/sub 90//Cr ferromagnetic cores, , , , and . IEEE Electron Device Letters, 24 (4): 224-226 (April 2003)Quantitative analysis of trust factors on social network using data mining approach., , , and . FGST, page 70-75. IEEE, (2012)Not every friend on a social network can be trusted: Classifying imposters using decision trees., , and . FGST, page 58-63. IEEE, (2012)Online registration system for recreational cycling marathons: Lessons learned., , , , , and . ICADIWT, volume 277 of Frontiers in Artificial Intelligence and Applications, page 120-126. IOS Press, (2015)Hierarchical classification in text mining for sentiment analysis of online news., , , and . Soft Comput., 20 (9): 3411-3420 (2016)