Sciweavers

2812 search results - page 13 / 563
» Secrecy in Multiagent Systems
Sort
View
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 8 months ago
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
Shengbao Wang, Zhenfu Cao, Haiyong Bao
ESAW
2000
Springer
14 years 1 days ago
From Analysis to Deployment: A Multi-agent Platform Survey
This paper presents a survey on multi-agent platforms, with a particular focus on methodology. It presents the four stages of the construction of a multi-agent system and derives f...
Pierre-Michel Ricordel, Yves Demazeau
DALT
2008
Springer
13 years 9 months ago
A Complete STIT Logic for Knowledge and Action, and Some of Its Applications
Abstract. This paper presents a complete temporal STIT logic for reasoning about multi-agency. I discuss its application for reasoning about norms, knowledge, autonomy, and other m...
Jan Broersen
SELMAS
2005
Springer
14 years 1 months ago
Engineering Organization-Based Multiagent Systems
In this paper, we examine the Multiagent Systems Engineering (MaSE) methodology and its applicability to developing organization-based multiagent systems, which are especially rele...
Scott A. DeLoach
ATAL
2004
Springer
14 years 1 months ago
Decentralized Resource Control for Multi-Agent Systems
In an open system, multi-agent computations must compete for resources required for satisfying their goals. We describe CyberOrgs, a hierarchical model for acquisition and control...
Nadeem Jamali, Indratmo, Xinghui Zhao, Gul Agha