Sciweavers

33 search results - page 4 / 7
» Knowledge-based modelling of voting protocols
Sort
View
ATAL
2005
Springer
13 years 10 months ago
Voting policies that cope with unreliable agents
Collaboration plays a critical role when a team is striving for goals that are difficult to achieve by an individual. In previous work, we defined the ETAPP (Environment-TaskAgen...
Christian Guttmann, Ingrid Zukerman
ATAL
2009
Springer
13 years 12 months ago
False name manipulations in weighted voting games: splitting, merging and annexation
An important aspect of mechanism design in social choice protocols and multiagent systems is to discourage insincere and manipulative behaviour. We examine the computational compl...
Haris Aziz, Mike Paterson
ECAI
2004
Springer
13 years 10 months ago
An architecture based on semantic weblogs for exploring the Web of People
This paper presents an architecture that helps users to collect and qualify meta-information about web resources within a weblog and then share them with a group of people. Our arc...
Tuan-Anh Ta, Jean-Marc Saglio, Michel Plu
FC
2005
Springer
104views Cryptology» more  FC 2005»
13 years 10 months ago
Event Driven Private Counters
We define and instantiate a cryptographic scheme called “private counters”, which can be used in applications such as preferential voting to express and update preferences (or...
Eu-Jin Goh, Philippe Golle
CCS
2010
ACM
13 years 5 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt