Sciweavers

529 search results - page 48 / 106
» ideas 2003
Sort
View
ICISC
2003
115views Cryptology» more  ICISC 2003»
13 years 11 months ago
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption
Bid-rigging is a dangerous attack in electronic auction. Abe and Suzuki firstly introduced the idea of receipt-free to prevent this attack. In this paper we point out that Abe and...
Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim
ICWS
2003
IEEE
13 years 11 months ago
Adaptive Workflow = Web Services + Agents
Workflow management systems exactly enact business processes described in a process description language. Unfortunately, such strict adherence to the prescribed workflow makes it ...
Paul A. Buhler, José M. Vidal, Harko Verhag...
IJCAI
2003
13 years 11 months ago
Building Data Integration Systems: A Mass Collaboration Approach
Building data integration systems today is largely done by hand, in a very labor intensive and error prone process. In this paper, we describe a conceptually new solution to this ...
AnHai Doan, Robert McCann
IJCAI
2003
13 years 11 months ago
Improving Coevolutionary Search for Optimal Multiagent Behaviors
Evolutionary computation is a useful technique for learning behaviors in multiagent systems. Among the several types of evolutionary computation, one natural and popular method is...
Liviu Panait, R. Paul Wiegand, Sean Luke
IJCAI
2003
13 years 11 months ago
Modular self-organization for a long-living autonomous agent
The aim of this paper is to provide a sound framework for addressing a difficult problem: the automatic construction of an autonomous agent's modular architecture. We briefly...
Bruno Scherrer