Sciweavers

2812 search results - page 18 / 563
» Secrecy in Multiagent Systems
Sort
View
ATAL
2010
Springer
15 years 11 days ago
Strategic executions of choreographed timed normative multi-agent systems
This paper proposes a combined mechanism for coordinating agents in timed normative multi-agent systems. Timing constraints in a multi-agent system make it possible to force actio...
Lacramioara Astefanoaei, Frank S. de Boer, Mehdi D...
PKC
2012
Springer
279views Cryptology» more  PKC 2012»
13 years 1 months ago
Circular and KDM Security for Identity-Based Encryption
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
Jacob Alperin-Sheriff, Chris Peikert
ICMAS
2000
15 years 18 days ago
Distributed Case-Based Learning
Multi-agent systems exploiting case based reasoning techniques have to deal with the problem of retrieving episodes that are themselves distributed across a set of agents. From a ...
M. V. Nagendra Prasad
ATAL
2005
Springer
15 years 4 months ago
3APL-M platform for deliberative agents in mobile devices
The demonstration presents the 3APL-M platform for building deliberative multi-agent systems whose components execute on resource bounded devices. Keywords agents, BDI, mobile dev...
Fernando Koch
AAMAS
2007
Springer
14 years 11 months ago
Local strategy learning in networked multi-agent team formation
Abstract. Networked multi-agent systems are comprised of many autonomous yet interdependent agents situated in a virtual social network. Two examples of such systems are supply cha...
Blazej Bulka, Matthew E. Gaston, Marie desJardins