Sciweavers

2812 search results - page 18 / 563
» Secrecy in Multiagent Systems
Sort
View
ATAL
2010
Springer
13 years 9 months ago
Strategic executions of choreographed timed normative multi-agent systems
This paper proposes a combined mechanism for coordinating agents in timed normative multi-agent systems. Timing constraints in a multi-agent system make it possible to force actio...
Lacramioara Astefanoaei, Frank S. de Boer, Mehdi D...
PKC
2012
Springer
279views Cryptology» more  PKC 2012»
11 years 11 months ago
Circular and KDM Security for Identity-Based Encryption
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
Jacob Alperin-Sheriff, Chris Peikert
ICMAS
2000
13 years 9 months ago
Distributed Case-Based Learning
Multi-agent systems exploiting case based reasoning techniques have to deal with the problem of retrieving episodes that are themselves distributed across a set of agents. From a ...
M. V. Nagendra Prasad
ATAL
2005
Springer
14 years 1 months ago
3APL-M platform for deliberative agents in mobile devices
The demonstration presents the 3APL-M platform for building deliberative multi-agent systems whose components execute on resource bounded devices. Keywords agents, BDI, mobile dev...
Fernando Koch
AAMAS
2007
Springer
13 years 8 months ago
Local strategy learning in networked multi-agent team formation
Abstract. Networked multi-agent systems are comprised of many autonomous yet interdependent agents situated in a virtual social network. Two examples of such systems are supply cha...
Blazej Bulka, Matthew E. Gaston, Marie desJardins