Sciweavers

132 search results - page 15 / 27
» Adversarial Behavior in Multi-agent Systems
Sort
View
ATAL
2010
Springer
13 years 9 months ago
A graph-theoretic approach to protect static and moving targets from adversaries
The static asset protection problem (SAP) in a road network is that of allocating resources to protect vertices, given any possible behavior by an adversary determined to attack t...
John P. Dickerson, Gerardo I. Simari, V. S. Subrah...
ATAL
2008
Springer
13 years 10 months ago
Role-based teamwork activity recognition in observations of embodied agent actions
Recognizing team actions in the behavior of embodied agents has many practical applications and had seen significant progress in recent years. One approach with proven results is ...
Linus J. Luotsinen, Ladislau Bölöni
MST
2011
200views Hardware» more  MST 2011»
13 years 3 months ago
Performance of Scheduling Policies in Adversarial Networks with Non-synchronized Clocks
In this paper we generalize the Continuous Adversarial Queuing Theory (CAQT) model [5] by considering the possibility that the router clocks in the network are not synchronized. W...
Antonio Fernández Anta, José Luis L&...
EATIS
2009
ACM
13 years 11 months ago
Agent based smart house platform with affective control
In this paper, we describe our work in developing an agent based smart house platform using TAOM4E development methodology and the JADE-platform with the Jadex-extension. In order...
Kuderna-Iulian Benta, Amalia Hoszu, Lucia Vacariu,...
CLIMA
2007
13 years 10 months ago
Fuzzy Argumentation for Trust
In an open Multi-Agent System, the goals of agents acting on behalf of their owners often conflict with each other. Therefore, a personal agent protecting the interest of a single...
Ruben Stranders, Mathijs de Weerdt, Cees Witteveen