Sciweavers

CJ
2002
70views more  CJ 2002»
13 years 4 months ago
Formal Methods for Assuring Security of Protocols
l examination of the underlying assumptions, abstractions, and possible actions. Consequently, assuring that a system behaves securely is virtually impossible without the use of ri...
Susan Older, Shiu-Kai Chin
DKE
2006
99views more  DKE 2006»
13 years 4 months ago
How to act on inconsistent news: Ignore, resolve, or reject
Inconsistencies frequently occur in news about the real-world. Some of these inconsistencies may be more significant than others, and some news may contain more inconsistencies th...
Anthony Hunter
UAI
2008
13 years 6 months ago
Learning When to Take Advice: A Statistical Test for Achieving A Correlated Equilibrium
We study a multiagent learning problem where agents can either learn via repeated interactions, or can follow the advice of a mediator who suggests possible actions to take. We pr...
Greg Hines, Kate Larson
CSCWD
2008
Springer
13 years 6 months ago
Computer aided architectural design: Wayfinding complexity analysis
Design is a complex process often described as a collaboration between a designer and herself. In architectural design, a designer must consider the selection of a subset of actio...
Brett Bojduj, Ben Weber, Kai-Florian Richter, Sven...
SELMAS
2004
Springer
13 years 10 months ago
A Software Framework for Automated Negotiation
If agents are to negotiate automatically with one another they must share a negotiation mechanism, specifying what possible actions each party can take at any given time, when nego...
Claudio Bartolini, Chris Preist, Nicholas R. Jenni...