This paper examines contract practices between suppliers and retailers in the agricultural seed industry. We construct and analyze single-retailer models of various contract types...
Cryptographic hash functions have been widely studied and are used in many current systems. Though much research has been done on the security of hash functions, system designers ...
It is a well-known fact that algorithms are often hidden inside mathematical proofs. If these proofs are formalized inside a proof assistant, then a mechanism called extraction ca...
This paper presents a role-based agent teamwork language called RoB-MALLET (Role-Based Multi-Agent Logic Language for Encoding Teamwork). Roles have been used to form multi-agent t...
Research on smart houses has mostly been focused on automation and invisible integration of technology, which may lead to a perceived loss of control and a sense of being observed....