Sciweavers

178 search results - page 31 / 36
» Impersonation Strategies in Auctions
Sort
View
AIR
2004
111views more  AIR 2004»
13 years 7 months ago
Towards Fast Vickrey Pricing using Constraint Programming
Ensuring truthfulness amongst self-interested agents bidding against one another in an auction can be computationally expensive when prices are determined using the Vickrey-Clarke-...
Alan Holland, Barry O'Sullivan
ARGMAS
2006
Springer
13 years 11 months ago
An Argumentation-Based Approach for Dialog Move Selection
Abstract. Modeling different types of dialog between autonomous agents is becoming an important research issue. Several proposals exist with a clear definition of the dialog protoc...
Leila Amgoud, Nabil Hameurlain
IAT
2009
IEEE
14 years 2 months ago
Extending Alternating-Offers Bargaining in One-to-Many and Many-to-Many Settings
Automating negotiations in markets where multiple buyers and sellers operate is a scientific challenge of extraordinary importance. One-to-one negotiations are classically studie...
Bo An, Nicola Gatti, Victor R. Lesser
FC
2007
Springer
128views Cryptology» more  FC 2007»
14 years 1 months ago
Informant: Detecting Sybils Using Incentives
We propose an economic approach to Sybil attack detection. In our Informant protocol, a detective offers a reward for Sybils to reveal themselves. The detective accepts from one i...
N. Boris Margolin, Brian Neil Levine
WECWIS
2005
IEEE
99views ECommerce» more  WECWIS 2005»
14 years 1 months ago
Service Allocation for Composite Web Services Based on Quality Attributes
Web services are software artifacts that can be accessed over the Internet. They can be seen as pay-per-view functionalities that are exposed by some service providers. If there a...
Shahram Esmaeilsabzali, Kate Larson