Sciweavers

1166 search results - page 138 / 234
» Negotiating Using Rewards
Sort
View
WPES
2003
ACM
14 years 3 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
ATAL
2003
Springer
14 years 3 months ago
Expressive global protocols via logic-based electronic institutions
Communication is the key feature of Multi-agent Systems. The interactions among components of a system may take many distinct forms of increasing complexity such as in auctions, n...
Wamberto Weber Vasconcelos
AOSE
2001
Springer
14 years 2 months ago
Bringing Coherence to Agent Conversations
In this paper, we present a social model for software agent conversations for action based on social commitments and their negotiation. We depart from the premises that conversati...
Roberto A. Flores, Robert C. Kremer
RE
2001
Springer
14 years 2 months ago
Goal-Oriented Requirements Engineering: A Guided Tour
pture, at different levels of abstraction, the various objectives the system under consideration should achieve. Goal-oriented requirements engineering is concerned with the use o...
Axel van Lamsweerde
ACSAC
2000
IEEE
14 years 2 months ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten