메뉴 건너뛰기




Volumn 21, Issue 3, 2010, Pages 175-185

Secure and efficient protocols for multiple interdependent issues negotiation

Author keywords

[No Author keywords available]

Indexed keywords

AGENT UTILITY FUNCTION; COMMUNICATION COST; MULTI-ISSUE NEGOTIATION; MULTIPLE ISSUE; OPTIMALITY; PRIVATE INFORMATION; RISK ATTITUDE; SECURE PROTOCOLS; UTILITY FUNCTIONS; UTILITY MODEL; WORK FOCUS;

EID: 77249114693     PISSN: 10641246     EISSN: None     Source Type: Journal    
DOI: 10.3233/IFS-2010-0449     Document Type: Article
Times cited : (15)

References (22)
  • 3
    • 0036888791 scopus 로고    scopus 로고
    • Using similarity criteria to make issue trade-offs in automated negotiations
    • P. Faratin, C. Sierra and N. R. Jennings, Using similarity criteria to make issue trade-offs in automated negotiations, In Artificial Intelligence 142 (2002), 205-237.
    • (2002) Artificial Intelligence , vol.142 , pp. 205-237
    • Faratin, P.1    Sierra, C.2    Jennings, N.R.3
  • 16
    • 0041488819 scopus 로고    scopus 로고
    • A fuzzy constraint based model for bilateral, multiissue negotiations in semi-competitive environments
    • X. Luo, N. R. Jennings, N. Shadbolt, H. Leung and J. H. Lee, A fuzzy constraint based model for bilateral, multiissue negotiations in semi-competitive environments, Artificial Intelligence 148 (2003), 53-102.
    • (2003) Artificial Intelligence , vol.148 , pp. 53-102
    • Luo, X.1    Jennings, N.R.2    Shadbolt, N.3    Leung, H.4    Lee, J.H.5
  • 21
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Commun ACM, 22(11) (1979), 612-613.
    • (1979) Commun ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.