Sciweavers

4340 search results - page 775 / 868
» Formal Methods and Cryptography
Sort
View
GLOBECOM
2008
IEEE
15 years 4 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
AAMAS
2008
Springer
15 years 4 months ago
Logic-based automated multi-issue bilateral negotiation in peer-to-peer e-marketplaces
Abstract. We present a novel logic-based framework to automate multi-issue bilateral negotiation in e-commerce settings. The approach exploits logic as communication language among...
Azzurra Ragone, Tommaso Di Noia, Eugenio Di Sciasc...
AAMAS
2008
Springer
15 years 4 months ago
Anticipation based on constraint processing in a multi-agent context
Anticipation is a general concept used and applied in various domains. Many studies in the field of artificial intelligence have investigated the capacity for anticipation. In thi...
Arnaud Doniec, René Mandiau, Sylvain Piecho...
COGSCI
2010
134views more  COGSCI 2010»
15 years 4 months ago
A Model of Knower-Level Behavior in Number Concept Development
We develop and evaluate a model of behavior on the Give-N task, a commonly used measure of young children's number knowledge. Our model uses the knower-level theory of how ch...
Michael D. Lee, Barbara W. Sarnecka
CJ
2008
97views more  CJ 2008»
15 years 4 months ago
Three Kinds of Probabilistic Induction: Universal Distributions and Convergence Theorems
We will describe three kinds of probabilistic induction problems, and give general solutions for each , with associated convergence theorems that show they tend to give good proba...
Ray J. Solomonoff