Sciweavers

6167 search results - page 970 / 1234
» Can Refinement be Automated
Sort
View
94
Voted
ATAL
2007
Springer
15 years 7 months ago
Winner determination for mixed multi-unit combinatorial auctions via petri nets
Mixed Multi-Unit Combinatorial Auctions (MMUCAs) allow agents to bid for bundles of goods to buy, goods to sell, and transformations of goods. In particular, MMUCAs offer a high ...
Andrea Giovannucci, Juan A. Rodríguez-Aguil...
ATAL
2007
Springer
15 years 7 months ago
Web services negotiation in an insurance grid
There are an increasing number of initiatives for the migration of agents research towards new Internet technologies such as the semantic web, Grid, and web services. On the one h...
Shamimabi Paurobally, Chris van Aart, Valentina A....
ATAL
2007
Springer
15 years 7 months ago
Market-driven agents with uncertain and dynamic outside options
One of the most crucial criterion in automated negotiation is how to reach a consensus agreement for all negotiators under any negotiation environment. Currently, most negotiation...
Fenghui Ren, Kwang Mong Sim, Minjie Zhang
AUSDM
2007
Springer
110views Data Mining» more  AUSDM 2007»
15 years 7 months ago
Adaptive Spike Detection for Resilient Data Stream Mining
Automated adversarial detection systems can fail when under attack by adversaries. As part of a resilient data stream mining system to reduce the possibility of such failure, adap...
Clifton Phua, Kate Smith-Miles, Vincent C. S. Lee,...
85
Voted
CCS
2007
ACM
15 years 7 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia