Sciweavers

301 search results - page 31 / 61
» Designing protocols for agent institutions
Sort
View
SAC
2002
ACM
13 years 7 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
IAT
2008
IEEE
14 years 2 months ago
Beyond Quasi-linear Utility: Strategy/False-Name-Proof Multi-unit Auction Protocols
We develop strategy/false-name-proof multi-unit auction protocols for non-quasi-linear utilities. One almost universal assumption in auction theory literature is that each bidder ...
Yuko Sakurai, Yasumasa Saito, Atsushi Iwasaki, Mak...
ICMAS
2000
13 years 9 months ago
An Experimental Evaluation of Domain-Independent Fault Handling Services in Open Multi-Agent Systems
A critical challenge to creating effective open multi-agent systems is allowing them to operate effectively in the face of potential failures. In this paper we present an experimen...
Chrysanthos Dellarocas, Mark Klein
AINA
2007
IEEE
13 years 11 months ago
An Agent-Based Architecture for Context-Aware Communication
We propose an agent-based architecture that allows context-aware communication between users. In seeking a model that is suitable for the design of the required functionalities of...
Romelia Plesa, Luigi Logrippo
JNSM
1998
94views more  JNSM 1998»
13 years 7 months ago
Design and Implementation of TMN SMK System Using CORBA ORB
In Telecommunication Management Network (TMN), the interworking of manager and agent requires the sharing of management information defined as Shared Management Knowledge (SMK) in...
Jong-Tae Park, Su-Ho Ha, James Won-Ki Hong