• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 19,241
Next 10 →

The Protection of Information in Computer Systems

by Jerome H. Saltzer, Michael D. Schroeder , 1975
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sections ..."
Abstract - Cited by 815 (2 self) - Add to MetaCart
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main

Illusion and well-being: A social psychological perspective on mental health

by Shelley E. Taylor, Jonathon D. Brown - Psychological Bulletin , 1988
"... Many prominent theorists have argued that accurate perceptions of the self, the world, and the future are essential for mental health. Yet considerable research evidence suggests that overly positive selfevaluations, exaggerated perceptions of control or mastery, and unrealistic optimism are charact ..."
Abstract - Cited by 923 (20 self) - Add to MetaCart
both the social world and cognitive-processing mechanisms impose filters on incoming information that distort it in a positive direction; negative information may be isolated and represented in as unthreatening a manner as possible. These positive illusions may be especially useful when an individual

Planning Algorithms

by Steven M LaValle , 2004
"... This book presents a unified treatment of many different kinds of planning algorithms. The subject lies at the crossroads between robotics, control theory, artificial intelligence, algorithms, and computer graphics. The particular subjects covered include motion planning, discrete planning, planning ..."
Abstract - Cited by 1108 (51 self) - Add to MetaCart
, planning under uncertainty, sensor-based planning, visibility, decision-theoretic planning, game theory, information spaces, reinforcement learning, nonlinear systems, trajectory planning, nonholonomic planning, and kinodynamic planning.

Chebyshev and Fourier Spectral Methods

by John P. Boyd , 1999
"... ..."
Abstract - Cited by 778 (12 self) - Add to MetaCart
Abstract not found

Incomplete Information and Deception in

by unknown authors
"... Much distributed artificial intelligence research on negotiation assumes complete knowledge among the interacting agents and/or truthful agents. These assumptions in many domains will not be realistic, and this paper extends previous work to begin dealing with the case of inter-agent negotiation wit ..."
Abstract - Add to MetaCart
with incomplete information as it did for complete information interactions. The possibility of incomplete information among agents opens up the possibility of deception as part of the negotiation strategy of an agent. Deception during negotiation among autonomous agents is thus analyzed in the constrained Blocks

Studying information technology in organizations: Research approaches and assumptions

by Wanda J. Orlikowski, Jack J. Baroudi - Information Systems Research , 1991
"... We examined 155 information systems research articles published from 1983 to 1988 and found that although this research is not rooted in a single overarching theoretical perspective, it does exhibit a single set of philosophical assumptions regarding the nature of the phenomena studied by informatio ..."
Abstract - Cited by 437 (2 self) - Add to MetaCart
We examined 155 information systems research articles published from 1983 to 1988 and found that although this research is not rooted in a single overarching theoretical perspective, it does exhibit a single set of philosophical assumptions regarding the nature of the phenomena studied

Field Experiments

by Glenn W. Harrison, John A. List, John Mcmillan, Colin Camerer, R. Mark Isaac, Charles Plott - Journal of Economic Literature Vol XLII , 2004
"... Experimental economists are leaving the reservation. They are recruiting subjects in the field rather than in the classroom, using field goods rather than induced valuations, and using field context rather than abstract terminology in instructions. We argue that there is something methodologically f ..."
Abstract - Cited by 398 (70 self) - Add to MetaCart
” in laboratory experiments might in fact be precisely the opposite if it is artificial to the subject or context of the task. We propose six factors that can be used to determine the field context of an experiment: the nature of the subject pool, the nature of the information that the subjects bring to the task

Interest-based negotiation in multi-agent Systems

by Iyad Rahwan , 2004
"... Software systems involving autonomous interacting software entities (or agents) present new challenges in computer science and software engineering. A particularly challenging problem is the engineering of various forms of interaction among agents. Interaction may be aimed at enabling agents to coor ..."
Abstract - Cited by 20 (10 self) - Add to MetaCart
, I focus on set-tings where agents have limited or uncertain information, precluding them from making optimal individual decisions. I demonstrate that this form of bounded-rationality may lead agents to sub-optimal negotiation agreements. I argue that rational dialogue based on the exchange

Deception: the role of consequences

by Uri Gneezy, I Thank Gary Charness, Martin Dufwenberg, Georg Kirchsteiger, David Levine, Muriel Niederle - American Economic Review , 2005
"... Abstract: This paper studies the role of consequences in a person’s decision to lie. Based on findings from an experiment with a deception game, as well as from questionnaires, I propose a simple formulation of preferences to describe deception behavior. The decision maker uses the “truth telling ” ..."
Abstract - Cited by 187 (6 self) - Add to MetaCart
Abstract: This paper studies the role of consequences in a person’s decision to lie. Based on findings from an experiment with a deception game, as well as from questionnaires, I propose a simple formulation of preferences to describe deception behavior. The decision maker uses the “truth telling

Industrial Deployment of Multi-Agent Technologies: . . .

by Michal Pěchouček, et al.
"... This paper reports on industrial deployment of multi-agent systems and agent technology. It provides an overview of several application domains and an in-depth presentation of four specific case studies. The presented applications and deployment domains have been analyzed. The analysis indicates th ..."
Abstract - Cited by 20 (1 self) - Add to MetaCart
This paper reports on industrial deployment of multi-agent systems and agent technology. It provides an overview of several application domains and an in-depth presentation of four specific case studies. The presented applications and deployment domains have been analyzed. The analysis indicates
Next 10 →
Results 1 - 10 of 19,241
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University