Sciweavers

2979 search results - page 100 / 596
» Modelling secure multiagent systems
Sort
View
113
Voted
SGAI
2007
Springer
15 years 8 months ago
Frequent Set Meta Mining: Towards Multi-Agent Data Mining
In this paper we describe the concept of Meta ARM in the context of its objectives and challenges and go on to describe and analyse a number of potential solutions. Meta ARM is de...
Kamal Ali Albashiri, Frans Coenen, Robert Sanderso...
99
Voted
ATAL
2004
Springer
15 years 8 months ago
Preference Elicitation without Numbers
The development of autonomous multi-agent systems acting upon the interests of one or more users involves the elicitation of preferences of these users. In decision theory, models...
P. H. M. P. Roelofsma, Martijn C. Schut
113
Voted
CSFW
1999
IEEE
15 years 7 months ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch
114
Voted
ISW
2004
Springer
15 years 8 months ago
Universally Composable Secure Mobile Agent Computation
We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally co...
Ke Xu, Stephen R. Tate
104
Voted
IAT
2007
IEEE
15 years 9 months ago
A Distributed Algorithm for Finding Nucleolus-Stable Payoff Divisions
The agents in multiagent systems can coordinate their actions and handle tasks jointly by forming coalitions. One of the important steps in this process is the fair division of pa...
Hrishikesh J. Goradia, José M. Vidal