callback( { "result":{ "query":":facetid:toc:\"db/conf/icaart/icaart2016-1.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"64.23" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"47", "@dc":"47", "@oc":"47", "@id":"43295138", "text":":facetid:toc:db/conf/icaart/icaart2016-1.bht" } }, "hits":{ "@total":"47", "@computed":"47", "@sent":"47", "@first":"0", "hit":[{ "@score":"1", "@id":"3238079", "info":{"authors":{"author":[{"@pid":"42/2586","text":"Troels Andreasen"},{"@pid":"92/2350","text":"Henrik Bulskov"},{"@pid":"95/2533","text":"Jørgen Fischer Nilsson"},{"@pid":"09/2841","text":"Per Anker Jensen"}]},"title":"On the Relationship between a Computational Natural Logic and Natural Language.","venue":"ICAART","pages":"335-342","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/AndreasenBNJ16","doi":"10.5220/0005848103350342","ee":"https://doi.org/10.5220/0005848103350342","url":"https://dblp.org/rec/conf/icaart/AndreasenBNJ16"}, "url":"URL#3238079" }, { "@score":"1", "@id":"3238083", "info":{"authors":{"author":[{"@pid":"42/8875","text":"Emna Ayari"},{"@pid":"29/3561","text":"Sameh El Hadouaj"},{"@pid":"08/565","text":"Khaled Ghédira"}]},"title":"Task Allocation in Multi-robot Systems - A Distributed Computation of a Satisfaction Measurement based Approach.","venue":"ICAART","pages":"207-214","year":"2016","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/icaart/AyariHG16","url":"https://dblp.org/rec/conf/icaart/AyariHG16"}, "url":"URL#3238083" }, { "@score":"1", "@id":"3238084", "info":{"authors":{"author":[{"@pid":"172/3664","text":"Viktor Ayzenshtadt"},{"@pid":"29/8296","text":"Christoph Langenhan"},{"@pid":"18/7411","text":"Syed Saqib Bukhari"},{"@pid":"a/KlausDieterAlthoff","text":"Klaus-Dieter Althoff"},{"@pid":"23/6877","text":"Frank Petzold"},{"@pid":"d/AndreasDengel","text":"Andreas Dengel 0001"}]},"title":"Thinking With Containers: A Multi-Agent Retrieval Approach for the Case-Based Semantic Search of Architectural Designs.","venue":"ICAART","pages":"149-156","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/AyzenshtadtLBAP16","doi":"10.5220/0005683801490156","ee":"https://doi.org/10.5220/0005683801490156","url":"https://dblp.org/rec/conf/icaart/AyzenshtadtLBAP16"}, "url":"URL#3238084" }, { "@score":"1", "@id":"3238088", "info":{"authors":{"author":[{"@pid":"166/1373","text":"Stefano Bennati"},{"@pid":"183/3796","text":"Leonard Wossnig"},{"@pid":"183/3759","text":"Johannes Thiele"}]},"title":"The Role of Information in Group Formation.","venue":"ICAART","pages":"231-235","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/BennatiWT16","doi":"10.5220/0005751802310235","ee":"https://doi.org/10.5220/0005751802310235","url":"https://dblp.org/rec/conf/icaart/BennatiWT16"}, "url":"URL#3238088" }, { "@score":"1", "@id":"3238096", "info":{"authors":{"author":[{"@pid":"134/6659","text":"Lucile Callebert"},{"@pid":"54/6194","text":"Domitile Lourdeaux"},{"@pid":"b/JeanPaulABarthes","text":"Jean-Paul A. Barthès"}]},"title":"A Trust-based Decision-making Approach Applied to Agents in Collaborative Environments.","venue":"ICAART","pages":"287-295","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/CallebertLB16","doi":"10.5220/0005825902870295","ee":"https://doi.org/10.5220/0005825902870295","url":"https://dblp.org/rec/conf/icaart/CallebertLB16"}, "url":"URL#3238096" }, { "@score":"1", "@id":"3238097", "info":{"authors":{"author":[{"@pid":"07/2867","text":"Ulrico Celentano"},{"@pid":"r/JuhaRoning","text":"Juha Röning"}]},"title":"Multi-robot Systems, Machine-Machine and Human-Machine Interaction, and Their Modelling.","venue":"ICAART","pages":"118-125","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/CelentanoR16","doi":"10.5220/0005667801180125","ee":"https://doi.org/10.5220/0005667801180125","url":"https://dblp.org/rec/conf/icaart/CelentanoR16"}, "url":"URL#3238097" }, { "@score":"1", "@id":"3238098", "info":{"authors":{"author":[{"@pid":"151/1454","text":"Stefan-Gabriel Chitic"},{"@pid":"50/1035","text":"Julien Ponge"},{"@pid":"s/OlivierSimonin","text":"Olivier Simonin 0001"}]},"title":"SDfR - Service Discovery for Robots.","venue":"ICAART","pages":"236-243","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/ChiticP016","doi":"10.5220/0005755202360243","ee":"https://doi.org/10.5220/0005755202360243","url":"https://dblp.org/rec/conf/icaart/ChiticP016"}, "url":"URL#3238098" }, { "@score":"1", "@id":"3238099", "info":{"authors":{"author":[{"@pid":"96/6270","text":"Matteo Cristani"},{"@pid":"145/5964","text":"Claudio Tomazzoli"},{"@pid":"10/7503","text":"Francesco Olivieri"}]},"title":"Semantic Social Network Analysis Foresees Message Flows.","venue":"ICAART","pages":"296-303","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/CristaniTO16","doi":"10.5220/0005832902960303","ee":"https://doi.org/10.5220/0005832902960303","url":"https://dblp.org/rec/conf/icaart/CristaniTO16"}, "url":"URL#3238099" }, { "@score":"1", "@id":"3238100", "info":{"authors":{"author":[{"@pid":"166/5168","text":"Malik Imran Daud"},{"@pid":"45/445-1","text":"David Sánchez 0001"},{"@pid":"25/6864","text":"Alexandre Viejo"}]},"title":"Ontology-based Access Control Management: Two Use Cases.","venue":"ICAART","pages":"244-249","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/Daud0V16","doi":"10.5220/0005777902440249","ee":"https://doi.org/10.5220/0005777902440249","url":"https://dblp.org/rec/conf/icaart/Daud0V16"}, "url":"URL#3238100" }, { "@score":"1", "@id":"3238101", "info":{"authors":{"author":[{"@pid":"135/5591","text":"Ameneh Deljoo"},{"@pid":"64/508","text":"Leon Gommans"},{"@pid":"46/1348","text":"Tom M. van Engers"},{"@pid":"d/CeesTAMdeLaat","text":"Cees de Laat"}]},"title":"An Agent-based Framework for Multi-domain Service Networks - Eduroam Case Study.","venue":"ICAART","pages":"275-280","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/DeljooGEL16","doi":"10.5220/0005821502750280","ee":"https://doi.org/10.5220/0005821502750280","url":"https://dblp.org/rec/conf/icaart/DeljooGEL16"}, "url":"URL#3238101" }, { "@score":"1", "@id":"3238106", "info":{"authors":{"author":[{"@pid":"98/3919","text":"Stefan Edelkamp"},{"@pid":"133/2653","text":"Christoph Greulich"}]},"title":"Branch-and-Bound Optimization of a Multiagent System for Flow Production using Model Checking.","venue":"ICAART","pages":"27-37","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/EdelkampG16","doi":"10.5220/0005705100270037","ee":"https://doi.org/10.5220/0005705100270037","url":"https://dblp.org/rec/conf/icaart/EdelkampG16"}, "url":"URL#3238106" }, { "@score":"1", "@id":"3238107", "info":{"authors":{"author":[{"@pid":"126/1003","text":"Sarah Edenhofer"},{"@pid":"168/2823","text":"Christopher Stifter"},{"@pid":"58/3801","text":"Sven Tomforde"},{"@pid":"141/6046","text":"Jan Kantert"},{"@pid":"35/873","text":"Christian Müller-Schloer"},{"@pid":"49/4583","text":"Jörg Hähner"}]},"title":"Comparison of Surveillance Strategies to Identify Undesirable Behaviour in Multi-Agent Systems.","venue":"ICAART","pages":"132-140","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/EdenhoferSTKMH16","doi":"10.5220/0005679201320140","ee":"https://doi.org/10.5220/0005679201320140","url":"https://dblp.org/rec/conf/icaart/EdenhoferSTKMH16"}, "url":"URL#3238107" }, { "@score":"1", "@id":"3238108", "info":{"authors":{"author":[{"@pid":"167/9894","text":"Zakarya Erraji"},{"@pid":"183/3717","text":"Mounia Janah"},{"@pid":"19/5353","text":"Imade Benelallam"},{"@pid":"47/4507","text":"El-Houssine Bouyakhf"}]},"title":"Mobile Robotic JChoc DisSolver - A Distributed Constraints Reasoning Platform for Mobile Multi-robot Problems.","venue":"ICAART","pages":"304-310","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/ErrajiJBB16","doi":"10.5220/0005833003040310","ee":"https://doi.org/10.5220/0005833003040310","url":"https://dblp.org/rec/conf/icaart/ErrajiJBB16"}, "url":"URL#3238108" }, { "@score":"1", "@id":"3238109", "info":{"authors":{"author":[{"@pid":"98/1919","text":"Rino Falcone"},{"@pid":"162/7813","text":"Alessandro Sapienza"},{"@pid":"96/1517","text":"Cristiano Castelfranchi"}]},"title":"Trusting Different Information Sources in a Weather Scenario: A Platform for Computational Simulation.","venue":"ICAART","pages":"165-172","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/FalconeSC16","doi":"10.5220/0005695501650172","ee":"https://doi.org/10.5220/0005695501650172","url":"https://dblp.org/rec/conf/icaart/FalconeSC16"}, "url":"URL#3238109" }, { "@score":"1", "@id":"3238111", "info":{"authors":{"author":[{"@pid":"183/3726","text":"Wataru Fujita"},{"@pid":"84/638","text":"Koichi Moriyama"},{"@pid":"40/4784","text":"Ken-ichi Fukui"},{"@pid":"71/1556","text":"Masayuki Numao"}]},"title":"Adaptive Two-stage Learning Algorithm for Repeated Games.","venue":"ICAART","pages":"47-55","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/FujitaMFN16","doi":"10.5220/0005711000470055","ee":"https://doi.org/10.5220/0005711000470055","url":"https://dblp.org/rec/conf/icaart/FujitaMFN16"}, "url":"URL#3238111" }, { "@score":"1", "@id":"3238112", "info":{"authors":{"author":[{"@pid":"120/1882","text":"Simone Gabbriellini"},{"@pid":"95/4886","text":"Francesco Santini 0001"}]},"title":"From Arguments and Reviewers to their Simulation - Reproducing a Case-Study.","venue":"ICAART","pages":"74-83","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/GabbrielliniS16","doi":"10.5220/0005816200740083","ee":"https://doi.org/10.5220/0005816200740083","url":"https://dblp.org/rec/conf/icaart/GabbrielliniS16"}, "url":"URL#3238112" }, { "@score":"1", "@id":"3238114", "info":{"authors":{"author":[{"@pid":"166/2086","text":"Ahmed Galal"},{"@pid":"142/1886","text":"Abeer Elkorany 0001"}]},"title":"Enabling Semantic User Context to Enhance Twitter Location Prediction.","venue":"ICAART","pages":"223-230","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/GalalE16","doi":"10.5220/0005749502230230","ee":"https://doi.org/10.5220/0005749502230230","url":"https://dblp.org/rec/conf/icaart/GalalE16"}, "url":"URL#3238114" }, { "@score":"1", "@id":"3238116", "info":{"authors":{"author":[{"@pid":"183/3752","text":"Hirotaka Goto"},{"@pid":"183/3791","text":"Asuka Ohta"},{"@pid":"71/1201","text":"Tomofumi Matsuzawa"},{"@pid":"46/1682","text":"Munehiro Takimoto"},{"@pid":"97/6108","text":"Yasushi Kambayashi"},{"@pid":"35/1544","text":"Masayuki Takeda"}]},"title":"A Guidance System for Wide-area Complex Disaster Evacuation based on Ant Colony Optimization.","venue":"ICAART","pages":"262-268","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/GotoOMTKT16","doi":"10.5220/0005819502620268","ee":"https://doi.org/10.5220/0005819502620268","url":"https://dblp.org/rec/conf/icaart/GotoOMTKT16"}, "url":"URL#3238116" }, { "@score":"1", "@id":"3238121", "info":{"authors":{"author":[{"@pid":"183/3753","text":"Noriyuki Hatakenaka"},{"@pid":"183/3780","text":"Shigemasa Matsuo"},{"@pid":"183/3764","text":"Kiriko Sakata"},{"@pid":"183/3803","text":"Munehiro Nishida"}]},"title":"Crowd Behavior in Alternative@ - Conflicts in the Decision-making between an Individual and the Group.","venue":"ICAART","pages":"258-261","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/HatakenakaMSN16","doi":"10.5220/0005819202580261","ee":"https://doi.org/10.5220/0005819202580261","url":"https://dblp.org/rec/conf/icaart/HatakenakaMSN16"}, "url":"URL#3238121" }, { "@score":"1", "@id":"3238122", "info":{"authors":{"author":[{"@pid":"134/4000","text":"Masashi Hayano"},{"@pid":"170/3541","text":"Yuki Miyashita"},{"@pid":"78/1202","text":"Toshiharu Sugawara"}]},"title":"Switching Behavioral Strategies for Effective Team Formation by Autonomous Agent Organization.","venue":"ICAART","pages":"56-65","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/HayanoMS16","doi":"10.5220/0005748200560065","ee":"https://doi.org/10.5220/0005748200560065","url":"https://dblp.org/rec/conf/icaart/HayanoMS16"}, "url":"URL#3238122" }, { "@score":"1", "@id":"3238125", "info":{"authors":{"author":{"@pid":"03/1145","text":"Tom Heskes"}},"title":"Causal Discovery from Big Data - Mission (Im)possible?.","venue":"ICAART","pages":"7","year":"2016","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/icaart/Heskes16","url":"https://dblp.org/rec/conf/icaart/Heskes16"}, "url":"URL#3238125" }, { "@score":"1", "@id":"3238129", "info":{"authors":{"author":[{"@pid":"123/2209","text":"Michimasa Inaba"},{"@pid":"183/3804","text":"Kana Otsuka"},{"@pid":"62/3050","text":"Kenichi Takahashi"}]},"title":"Experimental Investigation for a Human Relationship Formation Support Agent using Information Presentation During Conversation.","venue":"ICAART","pages":"87-94","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/InabaOT16","doi":"10.5220/0005643200870094","ee":"https://doi.org/10.5220/0005643200870094","url":"https://dblp.org/rec/conf/icaart/InabaOT16"}, "url":"URL#3238129" }, { "@score":"1", "@id":"3238131", "info":{"authors":{"author":[{"@pid":"135/3305","text":"Jirí Jelínek"},{"@pid":"183/3772","text":"Roman Klimes"}]},"title":"Improved Model of Social Networks Dynamics.","venue":"ICAART","pages":"141-148","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/JelinekK16","doi":"10.5220/0005682701410148","ee":"https://doi.org/10.5220/0005682701410148","url":"https://dblp.org/rec/conf/icaart/JelinekK16"}, "url":"URL#3238131" }, { "@score":"1", "@id":"3238134", "info":{"authors":{"author":[{"@pid":"141/6046","text":"Jan Kantert"},{"@pid":"17/7923","text":"Lukas Klejnowski"},{"@pid":"126/1003","text":"Sarah Edenhofer"},{"@pid":"58/3801","text":"Sven Tomforde"},{"@pid":"35/873","text":"Christian Müller-Schloer"}]},"title":"A Threatmodel for Trust-based Systems Consisting of Open, Heterogeneous and Distributed Agents.","venue":"ICAART","pages":"173-180","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/KantertKETM16","doi":"10.5220/0005696801730180","ee":"https://doi.org/10.5220/0005696801730180","url":"https://dblp.org/rec/conf/icaart/KantertKETM16"}, "url":"URL#3238134" }, { "@score":"1", "@id":"3238135", "info":{"authors":{"author":[{"@pid":"141/6046","text":"Jan Kantert"},{"@pid":"183/3722","text":"Melanie Kauder"},{"@pid":"126/1003","text":"Sarah Edenhofer"},{"@pid":"58/3801","text":"Sven Tomforde"},{"@pid":"35/873","text":"Christian Müller-Schloer"}]},"title":"Detecting Colluding Attackers in Distributed Grid Systems.","venue":"ICAART","pages":"198-206","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/KantertKETM16a","doi":"10.5220/0005708301980206","ee":"https://doi.org/10.5220/0005708301980206","url":"https://dblp.org/rec/conf/icaart/KantertKETM16a"}, "url":"URL#3238135" }, { "@score":"1", "@id":"3238140", "info":{"authors":{"author":[{"@pid":"72/1178","text":"Tomoko Koda"},{"@pid":"183/3797","text":"Takuto Ishioh"},{"@pid":"31/3586","text":"Takafumi Watanabe"},{"@pid":"183/3787","text":"Yoshihiko Kubo"}]},"title":"Analysis of Gender-specific Self-adaptors and Their Effects on Agent's Impressions.","venue":"ICAART","pages":"19-26","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/KodaIWK16","doi":"10.5220/0005660800190026","ee":"https://doi.org/10.5220/0005660800190026","url":"https://dblp.org/rec/conf/icaart/KodaIWK16"}, "url":"URL#3238140" }, { "@score":"1", "@id":"3238148", "info":{"authors":{"author":{"@pid":"55/5701","text":"Jérôme Lang"}},"title":"Computational Social Choice.","venue":"ICAART","pages":"9","year":"2016","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/icaart/Lang16","url":"https://dblp.org/rec/conf/icaart/Lang16"}, "url":"URL#3238148" }, { "@score":"1", "@id":"3238149", "info":{"authors":{"author":{"@pid":"19/7416","text":"Ramoni O. Lasisi"}},"title":"Bounds on Manipulation by Merging in Weighted Voting Games.","venue":"ICAART","pages":"66-73","year":"2016","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/icaart/Lasisi16","url":"https://dblp.org/rec/conf/icaart/Lasisi16"}, "url":"URL#3238149" }, { "@score":"1", "@id":"3238152", "info":{"authors":{"author":[{"@pid":"49/3283","text":"Wei Liu"},{"@pid":"68/3792","text":"Feng Yao"},{"@pid":"181/2821","text":"Ming Li"}]},"title":"Requirements Planning with Event Calculus for Self-adaptive Multi-agent System.","venue":"ICAART","pages":"110-117","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/LiuYL16","doi":"10.5220/0005660001100117","ee":"https://doi.org/10.5220/0005660001100117","url":"https://dblp.org/rec/conf/icaart/LiuYL16"}, "url":"URL#3238152" }, { "@score":"1", "@id":"3238153", "info":{"authors":{"author":{"@pid":"55/625","text":"Roussanka Loukanova"}},"title":"A Formalization of Generalized Parameters in Situated Information.","venue":"ICAART","pages":"343-353","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/Loukanova16","doi":"10.5220/0005850303430353","ee":"https://doi.org/10.5220/0005850303430353","url":"https://dblp.org/rec/conf/icaart/Loukanova16"}, "url":"URL#3238153" }, { "@score":"1", "@id":"3238157", "info":{"authors":{"author":[{"@pid":"07/7859","text":"Leo van Moergestel"},{"@pid":"183/3768","text":"Melvin van den Berg"},{"@pid":"183/3758","text":"Marco Knol"},{"@pid":"183/3775","text":"Rick van der Paauw"},{"@pid":"183/3765","text":"Kasper van Voorst"},{"@pid":"06/262","text":"Erik Puik"},{"@pid":"58/11219","text":"Daniël Telgen"},{"@pid":"m/JJCMeyer","text":"John-Jules Ch. Meyer"}]},"title":"Internet of Smart Things - A Study on Embedding Agents and Information in a Device.","venue":"ICAART","pages":"102-109","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/MoergestelBKPVP16","doi":"10.5220/0005659801020109","ee":"https://doi.org/10.5220/0005659801020109","url":"https://dblp.org/rec/conf/icaart/MoergestelBKPVP16"}, "url":"URL#3238157" }, { "@score":"1", "@id":"3238160", "info":{"authors":{"author":[{"@pid":"41/1652","text":"Hyunwoo Nam"},{"@pid":"56/9368","text":"Suyeong Kwak"},{"@pid":"90/3339","text":"Chulmin Jun"}]},"title":"Comparison of Improved Floor Field Model and Other Models.","venue":"ICAART","pages":"95-101","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/NamKJ16","doi":"10.5220/0005658700950101","ee":"https://doi.org/10.5220/0005658700950101","url":"https://dblp.org/rec/conf/icaart/NamKJ16"}, "url":"URL#3238160" }, { "@score":"1", "@id":"3238171", "info":{"authors":{"author":[{"@pid":"48/8706","text":"Marcin Pietron"},{"@pid":"87/5605","text":"Maciej Wielgosz"},{"@pid":"43/5638","text":"Pawel Russek"},{"@pid":"14/1940","text":"Kazimierz Wiatr"}]},"title":"Study of the Parallel Techniques for Dimensionality Reduction and Its Impact on Performance of the Text Processing Algorithms.","venue":"ICAART","pages":"315-322","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/PietronWRW16","doi":"10.5220/0005756903150322","ee":"https://doi.org/10.5220/0005756903150322","url":"https://dblp.org/rec/conf/icaart/PietronWRW16"}, "url":"URL#3238171" }, { "@score":"1", "@id":"3238174", "info":{"authors":{"author":{"@pid":"90/11028","text":"Eric Postma"}},"title":"Social Agents.","venue":"ICAART","pages":"13","year":"2016","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/icaart/Postma16","url":"https://dblp.org/rec/conf/icaart/Postma16"}, "url":"URL#3238174" }, { "@score":"1", "@id":"3238177", "info":{"authors":{"author":[{"@pid":"19/1326-2","text":"Silvia Rossi 0002"},{"@pid":"164/4678","text":"Francesco Cervone"}]},"title":"Social Utilities and Personality Traits for Group Recommendation: A Pilot User Study.","venue":"ICAART","pages":"38-46","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/RossiC16","doi":"10.5220/0005709600380046","ee":"https://doi.org/10.5220/0005709600380046","url":"https://dblp.org/rec/conf/icaart/RossiC16"}, "url":"URL#3238177" }, { "@score":"1", "@id":"3238178", "info":{"authors":{"author":[{"@pid":"35/10781","text":"Stefan Rudolph"},{"@pid":"58/3801","text":"Sven Tomforde"},{"@pid":"49/4583","text":"Jörg Hähner"}]},"title":"A Mutual Influence-based Learning Algorithm.","venue":"ICAART","pages":"181-189","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/RudolphTH16","doi":"10.5220/0005697001810189","ee":"https://doi.org/10.5220/0005697001810189","url":"https://dblp.org/rec/conf/icaart/RudolphTH16"}, "url":"URL#3238178" }, { "@score":"1", "@id":"3238179", "info":{"authors":{"author":[{"@pid":"148/3353","text":"Fadwa Sakr"},{"@pid":"a/SlimAbdennadher","text":"Slim Abdennadher"}]},"title":"Harnessing Supervised Learning Techniques for the Task Planning of Ambulance Rescue Agents.","venue":"ICAART","pages":"157-164","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/SakrA16","doi":"10.5220/0005692001570164","ee":"https://doi.org/10.5220/0005692001570164","url":"https://dblp.org/rec/conf/icaart/SakrA16"}, "url":"URL#3238179" }, { "@score":"1", "@id":"3238181", "info":{"authors":{"author":{"@pid":"02/2288","text":"Ichiro Satoh"}},"title":"Agent-based MapReduce Processing in IoT.","venue":"ICAART","pages":"250-257","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/Satoh16","doi":"10.5220/0005802102500257","ee":"https://doi.org/10.5220/0005802102500257","url":"https://dblp.org/rec/conf/icaart/Satoh16"}, "url":"URL#3238181" }, { "@score":"1", "@id":"3238186", "info":{"authors":{"author":[{"@pid":"46/4479","text":"Huma Shah"},{"@pid":"04/2872","text":"Kevin Warwick"}]},"title":"Imitating Gender as a Measure for Artificial Intelligence: - Is It Necessary?.","venue":"ICAART","pages":"126-131","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/ShahW16","doi":"10.5220/0005673901260131","ee":"https://doi.org/10.5220/0005673901260131","url":"https://dblp.org/rec/conf/icaart/ShahW16"}, "url":"URL#3238186" }, { "@score":"1", "@id":"3238187", "info":{"authors":{"author":[{"@pid":"46/4479","text":"Huma Shah"},{"@pid":"04/2872","text":"Kevin Warwick"}]},"title":"Distinguishing AI from Male/Female Dialogue.","venue":"ICAART","pages":"215-222","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/ShahW16a","doi":"10.5220/0005736802150222","ee":"https://doi.org/10.5220/0005736802150222","url":"https://dblp.org/rec/conf/icaart/ShahW16a"}, "url":"URL#3238187" }, { "@score":"1", "@id":"3238188", "info":{"authors":{"author":{"@pid":"s/JSSichman","text":"Jaime Simão Sichman"}},"title":"Multiagent Organizations.","venue":"ICAART","pages":"11","year":"2016","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/icaart/Sichman16","url":"https://dblp.org/rec/conf/icaart/Sichman16"}, "url":"URL#3238188" }, { "@score":"1", "@id":"3238194", "info":{"authors":{"author":{"@pid":"s/KatiaPSycara","text":"Katia P. Sycara"}},"title":"Robust Human Interaction with Robotic Swarms.","venue":"ICAART","pages":"5","year":"2016","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/icaart/Sycara16","url":"https://dblp.org/rec/conf/icaart/Sycara16"}, "url":"URL#3238194" }, { "@score":"1", "@id":"3238195", "info":{"authors":{"author":[{"@pid":"183/3721","text":"Shouhei Taga"},{"@pid":"71/1201","text":"Tomofumi Matsuzawa"},{"@pid":"46/1682","text":"Munehiro Takimoto"},{"@pid":"97/6108","text":"Yasushi Kambayashi"}]},"title":"Multi-agent Approach for Return Route Support System Simulation.","venue":"ICAART","pages":"269-274","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/TagaMTK16","doi":"10.5220/0005819602690274","ee":"https://doi.org/10.5220/0005819602690274","url":"https://dblp.org/rec/conf/icaart/TagaMTK16"}, "url":"URL#3238195" }, { "@score":"1", "@id":"3238198", "info":{"authors":{"author":[{"@pid":"70/9854","text":"Iryna Veryzhenko"},{"@pid":"181/1751","text":"Nathalie Oriol"}]},"title":"Post Flash Crash Recovery: An Agent-based Analysis.","venue":"ICAART","pages":"190-197","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/VeryzhenkoO16","doi":"10.5220/0005707401900197","ee":"https://doi.org/10.5220/0005707401900197","url":"https://dblp.org/rec/conf/icaart/VeryzhenkoO16"}, "url":"URL#3238198" }, { "@score":"1", "@id":"3238203", "info":{"authors":{"author":[{"@pid":"163/1827","text":"Max Wisniewski"},{"@pid":"b/CBenzmueller","text":"Christoph Benzmüller"}]},"title":"Is It Reasonable to Employ Agents in Automated Theorem Proving?.","venue":"ICAART","pages":"281-286","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/WisniewskiB16","doi":"10.5220/0005824702810286","ee":"https://doi.org/10.5220/0005824702810286","url":"https://dblp.org/rec/conf/icaart/WisniewskiB16"}, "url":"URL#3238203" }, { "@score":"1", "@id":"3238207", "info":{"authors":{"author":[{"@pid":"55/2008","text":"Yue Yu"},{"@pid":"183/3731","text":"Yicheng Wu"}]},"title":"The Interpretation of Elliptical Predicate Constructions in Mandarin: Semantic Underspecification and Pragmatic Enrichment.","venue":"ICAART","pages":"323-334","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icaart/YuW16","doi":"10.5220/0005830003230334","ee":"https://doi.org/10.5220/0005830003230334","url":"https://dblp.org/rec/conf/icaart/YuW16"}, "url":"URL#3238207" }, { "@score":"1", "@id":"3339103", "info":{"authors":{"author":[{"@pid":"h/HJaapvandenHerik","text":"H. Jaap van den Herik"},{"@pid":"34/3795","text":"Joaquim Filipe"}]},"title":"Proceedings of the 8th International Conference on Agents and Artificial Intelligence (ICAART 2016), Volume 1, Rome, Italy, February 24-26, 2016.","venue":"ICAART","publisher":"SciTePress","year":"2016","type":"Editorship","access":"unavailable","key":"conf/icaart/2016-1","url":"https://dblp.org/rec/conf/icaart/2016-1"}, "url":"URL#3339103" } ] } } } )