Sciweavers

192 search results - page 18 / 39
» Realization theory of Nash systems
Sort
View
ATAL
2009
Springer
14 years 3 months ago
Genius: negotiation environment for heterogeneous agents
In this demo, we present GENIUS, a tool that facilitates research in the area of bilateral multi-issue negotiation. It implements an open architecture allowing easy development an...
Koen V. Hindriks, Catholijn M. Jonker, Sarit Kraus...
ATAL
2003
Springer
14 years 2 months ago
Miscomputing ratio: social cost of selfish computing
Auctions are useful mechanism for allocating items (goods, tasks, resources, etc.) in multiagent systems. The bulk of auction theory assumes that the bidders’ valuations for ite...
Kate Larson, Tuomas Sandholm
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
14 years 1 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
EUSFLAT
2009
134views Fuzzy Logic» more  EUSFLAT 2009»
13 years 6 months ago
Flow Line Systems with Possibilistic Data: a System with Waiting Time in Line Uncertain
This paper proposes to analyze two flow line systems in which we include possibilistic data -the priority-discipline is possibilistic instead of probabilistic- and measure the perf...
David de la Fuente, María José Pardo
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 9 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger