Sciweavers

448 search results - page 13 / 90
» Playing With Population Protocols
Sort
View
AAAI
1997
13 years 9 months ago
James Bond and Michael Ovitz: The Secret Life of Agents
As agents populate Cyberspace in their many guises and roles, they coordinate and interact in different ways, spanning self-interested, as well as collaborative interactions. Agen...
Katia P. Sycara
CCS
2011
ACM
12 years 8 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum
EDCC
2010
Springer
14 years 1 months ago
Dependability Analysis of Diffusion Protocols in Wireless Networks with Heterogeneous Node Capabilities
Wireless networks are starting to be populated by interconnected devices that reveal remarkable hardware and software differences. This fact raises a number of questions on the ap...
Paolo Masci, Silvano Chiaradonna, Felicita Di Gian...
ATAL
2004
Springer
14 years 1 months ago
A Protocol for a Distributed Recommender System
We present a domain model and protocol for the exchange of recommendations by selfish agents without the aid of any centralized control. Our model captures a subset of the realiti...
José M. Vidal
ECIS
2000
13 years 9 months ago
Effects of Electronic Markets on Negotiation Processes
Negotiation can be regarded as playing a game with certain rules. If the rules change, the game has to be played differently. Compared to traditional markets, electronic markets ca...
Michael Stroebel