Sciweavers

549 search results - page 54 / 110
» Rationality in the Full-Information Model
Sort
View
CCS
2010
ACM
14 years 4 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
ICMCS
2007
IEEE
153views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Towards Adversary Aware Surveillance Systems
We consider surveillance problems to be a set of system- adversary interaction problems in which an adversary can be modeled as a rational (selfish) agent trying to maximize his ...
Vivek K. Singh, Mohan S. Kankanhalli
ATAL
2003
Springer
14 years 24 days ago
Democracy in open agent systems
What sort of democracies should open agent societies be? We present three normative models of democracy from political philosophy and consider their relevance for the engineering o...
Peter McBurney, Simon Parsons
ICIS
2001
13 years 10 months ago
Transaction Costs and Market Efficiency
Previous research suggests that a decline in transactions costs leads to improved economic efficiency. In this paper,weshowthatsuchadeclinewillintroduceincreasinglyuninformedconsu...
Bin Gu, Lorin M. Hitt
ATAL
2009
Springer
14 years 3 months ago
Reward shaping for valuing communications during multi-agent coordination
Decentralised coordination in multi-agent systems is typically achieved using communication. However, in many cases, communication is expensive to utilise because there is limited...
Simon A. Williamson, Enrico H. Gerding, Nicholas R...