Sciweavers

187 search results - page 28 / 38
» Utility-Based Role Exchange
Sort
View
IJNSEC
2008
190views more  IJNSEC 2008»
13 years 7 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid
COMBINATORICS
2007
64views more  COMBINATORICS 2007»
13 years 7 months ago
An Analogue of the Thue-Morse Sequence
We consider the finite binary words Z(n), n ∈ N, defined by the following selfsimilar process: Z(0) := 0, Z(1) := 01, and Z(n + 1) := Z(n) · Z(n − 1), where the dot · deno...
Emmanuel Ferrand
MAGS
2008
121views more  MAGS 2008»
13 years 7 months ago
A decentralized model for automated multi-attribute negotiations with incomplete information and general utility functions
This paper presents a decentralized model that allows self-interested agents to reach "win-win" agreements in a multi-attribute negotiation. The model is based on an alt...
Guoming Lai, Katia P. Sycara, Cuihong Li
KER
2006
70views more  KER 2006»
13 years 7 months ago
A theoretical inter-organizational trust-based security model
This work examines the interplay of inter-personal and inter-organizational trust, two distinct but related concepts, through a theoretic inter-organizational trust-based security...
Henry Hexmoor, Seth Wilson, Sandeep Bhattaram
ML
2007
ACM
122views Machine Learning» more  ML 2007»
13 years 7 months ago
Status report: hot pickles, and how to serve them
The need for flexible forms of serialisation arises under many circumstances, e.g. for doing high-level inter-process communication or to achieve persistence. Many languages, inc...
Andreas Rossberg, Guido Tack, Leif Kornstaedt