Sciweavers

1653 search results - page 264 / 331
» Computer science and game theory
Sort
View
ITICSE
2005
ACM
15 years 3 months ago
A prolog toolkit for formal languages and automata
This paper describes the first version of P (read “P flat”), a collection of Prolog predicates that aims to provide a pedagogical implementation of concepts and algorithms t...
Michel Wermelinger, Artur Miguel Dias
ATAL
2005
Springer
15 years 3 months ago
Negotiating over small bundles of resources
When rational but myopic agents negotiate over the exchange of indivisible resources, any restriction to the negotiation protocol may prevent the system from converging to a socia...
Yann Chevaleyre, Ulle Endriss, Jérôme...
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 3 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
LICS
2003
IEEE
15 years 3 months ago
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or
We present decidability results for the verification of cryptographic protocols in the presence of equational theories corresponding to xor and Abelian groups. Since the perfect ...
Hubert Comon-Lundh, Vitaly Shmatikov
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
15 years 1 months ago
Language communities in enterprise architecture research
As a result of the rigor vs. relevance debate, researchers who focus on design research on organizational problems are beginning to focus on their research methodology’s rigor. ...
Joachim Schelp, Robert Winter