Sciweavers

4737 search results - page 889 / 948
» The LOGIC negotiation model
Sort
View
153
Voted
ECAI
2010
Springer
15 years 4 months ago
Computational Aspects of Extending the Shapley Value to Coalitional Games with Externalities
Abstract. Until recently, computational aspects of the Shapley value were only studied under the assumption that there are no externalities from coalition formation, i.e., that the...
Tomasz P. Michalak, Talal Rahwan, Dorota Marciniak...
128
Voted
CNL
2009
15 years 4 months ago
Rhetorical Compositions for Controlled Natural Languages
Logic-based controlled natural languages usually provide some facility for compositional representation, minimally including sentence level coordination and sometimes subordination...
Andrew Potter
200
Voted
FC
2010
Springer
260views Cryptology» more  FC 2010»
15 years 4 months ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
130
Voted
ICASSP
2010
IEEE
15 years 4 months ago
Forensic estimation and reconstruction of a contrast enhancement mapping
Due to the ease with which convincing digital image forgeries can be created, a need has arisen for digital forensic techniques capable of detecting image manipulation. Once image...
Matthew C. Stamm, K. J. Ray Liu
133
Voted
AAMAS
2007
Springer
15 years 3 months ago
Local strategy learning in networked multi-agent team formation
Abstract. Networked multi-agent systems are comprised of many autonomous yet interdependent agents situated in a virtual social network. Two examples of such systems are supply cha...
Blazej Bulka, Matthew E. Gaston, Marie desJardins