The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Coverage, fault tolerance and power consumption constraints make optimal placement of mobile sensors or other mobile agents a hard problem. We have developed a model for describin...
Information about the opponent is essential to improve automated negotiation strategies for bilateral multiissue negotiation. In this paper we propose a negotiation strategy that e...
Koen V. Hindriks, Catholijn M. Jonker, Dmytro Tykh...
We present a utility-driven rationality and a complementary-driven rationality based model, relative to multiple partner coalitions, motivated by relations of dependence and instru...
Models for sequential decision making under uncertainty (e.g., Markov decision processes,or MDPs) have beenstudied in operations research for decades. The recent incorporation of ...