Sciweavers

301 search results - page 31 / 61
» Designing protocols for agent institutions
Sort
View
123
Voted
SAC
2002
ACM
15 years 3 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
130
Voted
IAT
2008
IEEE
15 years 10 months ago
Beyond Quasi-linear Utility: Strategy/False-Name-Proof Multi-unit Auction Protocols
We develop strategy/false-name-proof multi-unit auction protocols for non-quasi-linear utilities. One almost universal assumption in auction theory literature is that each bidder ...
Yuko Sakurai, Yasumasa Saito, Atsushi Iwasaki, Mak...
159
Voted
ICMAS
2000
15 years 5 months ago
An Experimental Evaluation of Domain-Independent Fault Handling Services in Open Multi-Agent Systems
A critical challenge to creating effective open multi-agent systems is allowing them to operate effectively in the face of potential failures. In this paper we present an experimen...
Chrysanthos Dellarocas, Mark Klein
150
Voted
AINA
2007
IEEE
15 years 7 months ago
An Agent-Based Architecture for Context-Aware Communication
We propose an agent-based architecture that allows context-aware communication between users. In seeking a model that is suitable for the design of the required functionalities of...
Romelia Plesa, Luigi Logrippo
108
Voted
JNSM
1998
94views more  JNSM 1998»
15 years 3 months ago
Design and Implementation of TMN SMK System Using CORBA ORB
In Telecommunication Management Network (TMN), the interworking of manager and agent requires the sharing of management information defined as Shared Management Knowledge (SMK) in...
Jong-Tae Park, Su-Ho Ha, James Won-Ki Hong