Sciweavers

CJ
2002
70views more  CJ 2002»
14 years 8 months ago
Formal Methods for Assuring Security of Protocols
l examination of the underlying assumptions, abstractions, and possible actions. Consequently, assuring that a system behaves securely is virtually impossible without the use of ri...
Susan Older, Shiu-Kai Chin
61
Voted
DKE
2006
99views more  DKE 2006»
14 years 8 months ago
How to act on inconsistent news: Ignore, resolve, or reject
Inconsistencies frequently occur in news about the real-world. Some of these inconsistencies may be more significant than others, and some news may contain more inconsistencies th...
Anthony Hunter
UAI
2008
14 years 10 months ago
Learning When to Take Advice: A Statistical Test for Achieving A Correlated Equilibrium
We study a multiagent learning problem where agents can either learn via repeated interactions, or can follow the advice of a mediator who suggests possible actions to take. We pr...
Greg Hines, Kate Larson
CSCWD
2008
Springer
14 years 10 months ago
Computer aided architectural design: Wayfinding complexity analysis
Design is a complex process often described as a collaboration between a designer and herself. In architectural design, a designer must consider the selection of a subset of actio...
Brett Bojduj, Ben Weber, Kai-Florian Richter, Sven...
SELMAS
2004
Springer
15 years 2 months ago
A Software Framework for Automated Negotiation
If agents are to negotiate automatically with one another they must share a negotiation mechanism, specifying what possible actions each party can take at any given time, when nego...
Claudio Bartolini, Chris Preist, Nicholas R. Jenni...