Sciweavers

1166 search results - page 131 / 234
» Negotiating Using Rewards
Sort
View
SPW
2004
Springer
14 years 3 months ago
Privacy Is Linking Permission to Purpose
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
Fabio Massacci, Nicola Zannone
36
Voted
ICDCSW
2000
IEEE
14 years 2 months ago
Enabling Flexible QoS Support in the Object Request Broker COOL
Support of end-to-end Quality-of-Service (QoS) and ate high-level programming abstractions are two crucial factors for the development of future telecommunication services and dis...
Tom Kristensen, Thomas Plagemann
ATAL
2006
Springer
14 years 1 months ago
Magenta technology multi-agent logistics i-Scheduler for road transportation
The paper describes main features of an Intelligent Scheduler for Road Transportation Applications based on Magenta agent technology and characterized by a number of unique, advan...
Jonathan Himoff, George Rzevski, Petr Skobelev
TSMC
2010
13 years 4 months ago
A Model for the Integration of Prioritized Knowledge Bases Through Subjective Belief Games
Belief merging is concerned with the integration of several belief bases such that a coherent belief base is developed. Various belief merging models have been developed that use a...
Ebrahim Bagheri, Ali A. Ghorbani
SIGSOFT
2007
ACM
14 years 11 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska