Sciweavers

7715 search results - page 1196 / 1543
» Visual Rules Modeling
Sort
View
ICSOC
2010
Springer
15 years 3 months ago
Service Discovery Using Communication Fingerprints
A request to a service registry must be answered with a service that fits in several regards, including semantic compatibility, non-functional compatibility, and interface compati...
Olivia Oanea, Jan Sürmeli, Karsten Wolf
153
Voted
SAGT
2010
Springer
191views Game Theory» more  SAGT 2010»
15 years 2 months ago
Complexity of Safe Strategic Voting
We investigate the computational aspects of safe manipulation, a new model of coalitional manipulation that was recently put forward by Slinko and White [11]. In this model, a pot...
Noam Hazon, Edith Elkind
SIGECOM
2010
ACM
135views ECommerce» more  SIGECOM 2010»
15 years 2 months ago
Cooperation in anonymous dynamic social networks
We study the emergence of cooperation in dynamic, anonymous social networks, such as in online communities. We examine prisoner’s dilemma played under a social matching protocol...
Nicole Immorlica, Brendan Lucier, Brian Rogers
SUM
2010
Springer
15 years 2 months ago
Cost-Based Query Answering in Action Probabilistic Logic Programs
Abstract. Action-probabilistic logic programs (ap-programs), a class of probabilistic logic programs, have been applied during the last few years for modeling behaviors of entities...
Gerardo I. Simari, John P. Dickerson, V. S. Subrah...
147
Voted
AAAI
2010
15 years 2 months ago
Cloning in Elections
We consider the problem of manipulating elections via cloning candidates. In our model, a manipulator can replace each candidate c by one or more clones, i.e., new candidates that...
Edith Elkind, Piotr Faliszewski, Arkadii M. Slinko
« Prev « First page 1196 / 1543 Last » Next »