Alon Grubshtein

According to our database1, Alon Grubshtein authored at least 13 papers between 2009 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
AgentZero: A Framework for Simulating and Evaluating Multi-agent Algorithms.
Proceedings of the Agent-Oriented Software Engineering, 2014

2013
Asymmetric Distributed Constraint Optimization Problems.
J. Artif. Intell. Res., 2013

2012
Concurrent forward bounding for distributed constraint optimization problems.
Artif. Intell., 2012

Partial Cooperation in Multi-agent Local Search.
Proceedings of the ECAI 2012, 2012

Finding a Nash Equilibrium by Asynchronous Backtracking.
Proceedings of the Principles and Practice of Constraint Programming, 2012

Partial cooperation in multi-agent search.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

2011
Hybrid search for minimal perturbation in Dynamic CSPs.
Constraints An Int. J., 2011

A Distributed Cooperative Approach for Optimizing a Family of Network Games.
Proceedings of the Intelligent Distributed Computing V - Proceedings of the 5th International Symposium on Intelligent Distributed Computing - IDC 2011, Delft, The Netherlands, 2011

Cooperation Mechanism for a Network Game.
Proceedings of the ICAART 2011 - Proceedings of the 3rd International Conference on Agents and Artificial Intelligence, Volume 2, 2011

2010
Cost of cooperation for scheduling meetings.
Comput. Sci. Inf. Syst., 2010

Manipulating Recommendation Lists by Global Considerations.
Proceedings of the ICAART 2010 - Proceedings of the International Conference on Agents and Artificial Intelligence, Volume 2, 2010

Local search for distributed asymmetric optimization.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

2009
Methods for Computing Trust and Reputation While Preserving Privacy.
Proceedings of the Data and Applications Security XXIII, 2009


  Loading...