Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only n...
Virgil D. Gligor, Himanshu Khurana, Radostina K. K...
Abstract. We adopt the Markov chain framework to model bilateral negotiations among agents in dynamic environments and use Bayesian learning to enable them to learn an optimal stra...
A conflict is a common phenomenon that results from the interaction between both individuals and groups of individuals. For the development of knowledge-based systems, one needs t...
In the constraint proposal method a mediator locates points at which the two decision makers have joint tangent hyperplanes. We give conditions under which these points are Pareto...
This paper presents a TDMA based multi-channel MAC protocol called TMMAC for Ad Hoc Networks. TMMAC requires only a single half-duplex radio transceiver on each node. In addition t...
Jingbin Zhang, Gang Zhou, Chengdu Huang, Sang Hyuk...