Sciweavers

301 search results - page 43 / 61
» Designing protocols for agent institutions
Sort
View
ICISS
2007
Springer
14 years 1 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
LATIN
2010
Springer
13 years 9 months ago
Randomized Truthful Algorithms for Scheduling Selfish Tasks on Parallel Machines
We study the problem of designing truthful algorithms for scheduling a set of tasks, each one owned by a selfish agent, to a set of parallel (identical or unrelated) machines in or...
Eric Angel, Evripidis Bampis, Nicolas Thibault
ATAL
2003
Springer
14 years 24 days ago
Behaviors that emerge from emotion and cognition: implementation and evaluation of a symbolic-connectionist architecture
This paper describes the implementation and evaluation of a framework for modeling emotions in complex, decision-making agents. Sponsored by U.S. Army Research Institute (ARI), th...
Amy E. Henninger, Randolph M. Jones, Eric Chown
ISCC
2003
IEEE
14 years 25 days ago
On the Issues of IP Traceback for IPv6 and Mobile IPv6
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, Denial-of-Service (DoS) and Distr...
Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi...
ATAL
2005
Springer
14 years 1 months ago
Layered message semantics using social commitments
Although mental states have its own place in the definition of message semantics, social commitments have emerged as a complementing element to circumvent the limitations of usin...
Roberto A. Flores, Philippe Pasquier, Brahim Chaib...