Sciweavers

35419 search results - page 122 / 7084
» How are we doing
Sort
View
116
Voted
ASIACRYPT
2001
Springer
15 years 7 months ago
Secure Human Identification Protocols
One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of prot...
Nicholas J. Hopper, Manuel Blum
120
Voted
ATAL
2007
Springer
15 years 10 months ago
Analysing Buyers' and Sellers' Strategic Interactions in Marketplaces: An Evolutionary Game Theoretic Approach
We develop a new model to analyse the strategic behaviour of buyers and sellers in market mechanisms. In particular, we wish to understand how the different strategies they adopt ...
Perukrishnen Vytelingum, Dave Cliff, Nicholas R. J...
144
Voted
FUIN
2007
114views more  FUIN 2007»
15 years 3 months ago
Cellular Devices and Unary Languages
Devices of interconnected parallel acting sequential automata are investigated from a language theoretic point of view. Starting with the well-known result that each unary language...
Andreas Klein, Martin Kutrib
136
Voted
CORR
2007
Springer
119views Education» more  CORR 2007»
15 years 3 months ago
Using Description Logics for Recognising Textual Entailment
The aim of this paper is to show how we can handle the Recognising Textual Entailment (RTE) task by using Description Logics (DLs). To do this, we propose a representation of natur...
Paul Bedaride
ARGMAS
2005
Springer
15 years 9 months ago
Argumentation-Based Multi-agent Dialogues for Deliberation
This paper presents an argumentation-based approach to deliberation, the process by which two or more agents reach a consensus on a course of action. The kind of deliberation that ...
Yuqing Tang, Simon Parsons