Sciweavers

456 search results - page 76 / 92
» Modeling Negotiation Subdialogues
Sort
View
AR
2010
101views more  AR 2010»
13 years 7 months ago
Novel Energy Transfer Mechanism in a Running Quadruped Robot with One Actuator per Leg
In this work we develop a novel method, or mechanism, of energy transfer in a quadruped running robot. The robot possesses only one actuator per leg, for lower weight and greater ...
Nicholas Cherouvim, Evangelos Papadopoulos
RULEML
2010
Springer
13 years 6 months ago
A Contract Agreement Policy-Based Workflow Methodology for Agents Interacting in the Semantic Web
The Semantic Web aims at automating Web content understanding and user request satisfaction. Intelligent agents assist towards this by performing complex actions on behalf of their...
Kalliopi Kravari, Grammati-Eirini Kastori, Nick Ba...
ISCI
2010
146views more  ISCI 2010»
13 years 5 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
ICIP
2008
IEEE
14 years 10 months ago
Game-theoretic analysis of maximum-payoff multiuser collusion
Multiuser collusion is an effective attack against traitor-tracing multimedia fingerprinting, where a group of attackers collectively mount attacks to reduce their risk of being d...
H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu
GLOBECOM
2008
IEEE
14 years 3 months ago
Network Formation Games for Distributed Uplink Tree Construction in IEEE 802.16J Networks
— This paper investigates the problem of the formation of an uplink tree structure among the IEEE 802.16j network’s relay stations (RSs) and their serving base station (MR-BS)....
Walid Saad, Zhu Han, Mérouane Debbah, Are H...