This paper reports on experiments in (human) multi-issue negotiation and their analysis, and presents a generic software environment supporting such an analysis. First, the paper p...
Tibor Bosse, Catholijn M. Jonker, Lourens van der ...
We propose a framework for defining agent-based models (ABMs) and two algorithms for the automatic parallelization of agent-based models, a general version P-ABMG for all ABMs def...
1 The techniques for image analysis and classi cation generally consider the image sample labels xed and without uncertainties. The rank regression problem is studied in this pape...
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
We present a novel technique that automatically alerts authors of requirements to the presence of potentially dangerous ambiguities. We first establish the notion of nocuous ambig...
Francis Chantree, Bashar Nuseibeh, Anne N. De Roec...