Sciweavers

3452 search results - page 60 / 691
» On the Study of Negotiation Strategies
Sort
View
107
Voted
INFOCOM
2005
IEEE
15 years 6 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
107
Voted
KES
2000
Springer
15 years 4 months ago
Agent and user inhabited virtual communities: a case study
: We report about ongoing research in a virtual reality environment where visitors can interact with agents that help them to obtain information, to peform certain transactions and...
Anton Nijholt
COMPSEC
2006
110views more  COMPSEC 2006»
15 years 22 days ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
97
Voted
ENTCS
2007
103views more  ENTCS 2007»
15 years 20 days ago
Policy-based Coordination in PAGODA: A Case Study
PAGODA (Policy And GOal Based Distributed Autonomy) is a modular architecture for specifying and prototyping autonomous systems. A PAGODA node (agent) interacts with its environme...
Carolyn L. Talcott
83
Voted
ATAL
2003
Springer
15 years 6 months ago
An evolutionary framework for studying behaviors of economic agents
We propose an evolutionary framework for studying agents that interact in electronic marketplaces. We describe how this framework could be used to study the dynamics of interactio...
Wolfgang Ketter, Alexander Babanov, Maria L. Gini