Results for 'agent protocols'

1000+ found
Order:
  1.  16
    Communication Education, Modeling, and Protocols Transform Clinicians to Agents of Empowerment.Keith M. Swetz, Michael D. Barnett & Kathleen M. McKillip - 2017 - American Journal of Bioethics 17 (11):40-42.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Hidden protocols: Modifying our expectations in an evolving world.Hans van Ditmarsch, Sujata Ghosh, Rineke Verbrugge & Yanjing Wang - 2014 - Artificial Intelligence 208 (1):18--40.
    When agents know a protocol, this leads them to have expectations about future observations. Agents can update their knowledge by matching their actual observations with the expected ones. They eliminate states where they do not match. In this paper, we study how agents perceive protocols that are not commonly known, and propose a semantics-driven logical framework to reason about knowledge in such scenarios. In particular, we introduce the notion of epistemic expectation models and a propositional dynamic logic-style epistemic logic (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  3.  20
    Intensional Protocols for Dynamic Epistemic Logic.Suzanne Wijk, Rasmus Rendsvig & Hanna Lee - 2019 - Journal of Philosophical Logic 48 (6):1077-1118.
    In dynamical multi-agent systems, agents are controlled by protocols. In choosing a class of formal protocols, an implicit choice is made concerning the types of agents, actions and dynamics representable. This paper investigates one such choice: An intensional protocol class for agent control in dynamic epistemic logic (DEL), called ‘DEL dynamical systems’. After illustrating how such protocols may be used in formalizing and analyzing information dynamics, the types of epistemic temporal models that they may generate (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  23
    Intensional Protocols for Dynamic Epistemic Logic.Hanna S. van Lee, Rasmus K. Rendsvig & Suzanne van Wijk - 2019 - Journal of Philosophical Logic 48 (6):1077-1118.
    In dynamical multi-agent systems, agents are controlled by protocols. In choosing a class of formal protocols, an implicit choice is made concerning the types of agents, actions and dynamics representable. This paper investigates one such choice: An intensional protocol class for agent control in dynamic epistemic logic, called ‘DEL dynamical systems’. After illustrating how such protocols may be used in formalizing and analyzing information dynamics, the types of epistemic temporal models that they may generate are (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  30
    Protocol, pattern and paper: interactive stabilization of immunohistochemical knowledge.Hubertus Nederbragt - 2010 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 41 (4):386-395.
    This paper analyzes the investigation of the distribution of the protein tenascin-C in canine mammary tumors. The method involved immunohistochemistry of tissue slices, performed by the application of an antibody to tenascin-C that specifically can be made visible for microscopic inspection. The first phase of the project is the making of the protocol, the second the deduction of a pattern of tenascin-C distribution in tumors and the third the writing of a paper. Each of the phases is analyzed separately, using (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6.  12
    Verifying epistemic protocols under common knowledge.Yanjing Wang, Lakshmanan Kuppusamy & Jan van Eijck - 2009 - Proceedings of the 11th Conference on Theoretical Aspects of Rationality and Knowledge - Tark ’09:257--266.
    Epistemic protocols are communication protocols aiming at transfer of knowledge in a controlled way. Typically, the preconditions or goals for protocol actions depend on the knowledge of agents, often in nested form. Informal epistemic protocol descriptions for muddy children, coordinated attack, dining cryptographers, Russian cards, secret key exchange are well known. The contribution of this paper is a formal study of a natural requirement on epistemic protocols, that the contents of the protocol can be assumed to be (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  7. Reasoning with protocols under imperfect information.Eric Pacuit & Sunil Simon - 2011 - Review of Symbolic Logic 4 (3):412-444.
    We introduce and study a PDL-style logic for reasoning about protocols, or plans, under imperfect information. Our paper touches on a number of issues surrounding the relationship between an agent’s abilities, available choices, and information in an interactive situation. The main question we address is under what circumstances can the agent commit to a protocol or plan, and what can she achieve by doing so?
    No categories
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  8.  62
    Retraction and Revocation in Agent Deliberation Dialogs.Peter McBurney & Simon Parsons - 2007 - Argumentation 21 (3):269-289.
    We present a generic denotational semantic framework for protocols for dialogs between rational and autonomous agents over action which allows for retraction and revocation of proposals for action. The semantic framework views participants in a deliberation dialog as jointly and incrementally manipulating the contents of shared spaces of action-intention tokens. The framework extends prior work by decoupling the identity of an agent who first articulates a proposal for action from the identity of any agent then empowered to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  24
    A logic for extensional protocols.Ben Rodenhäuser - 2011 - Journal of Applied Non-Classical Logics 21 (3-4):477-502.
    We study a logic for reasoning about agents that pass messages according to a protocol. Protocols are specified extensionally, as sets of sequences of ?legal? actions assigned to each state in a Kripke model. Message-passing events that are licensed by the protocol are modeled as updates in the style of dynamic epistemic logic. We also consider changes to the protocol by introducing message-encoding modalities, corresponding to communications actions that lead to protocol extensions. While in our general framework, messages are (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  58
    Update Semantics of Security Protocols.Arjen Hommersom, John-Jules Meyer & Erik De Vink - 2004 - Synthese 142 (2):229 - 267.
    We present a model-theoretic approach for reasoning about security protocols, applying recent insights from dynamic epistemic logics. This enables us to describe exactly the subsequent epistemic states of the agents participating in the protocol, using Kripke models and transitions between these based on updates of the agent's beliefs associated with steps in the protocol. As a case study we will consider the SRA Three Pass protocol and discuss the Wide-Mouthed Frog protocol.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  49
    Padua: A protocol for argumentation dialogue using association rules. [REVIEW]Maya Wardeh, Trevor Bench-Capon & Frans Coenen - 2009 - Artificial Intelligence and Law 17 (3):183-215.
    We describe PADUA, a protocol designed to support two agents debating a classification by offering arguments based on association rules mined from individual datasets. We motivate the style of argumentation supported by PADUA, and describe the protocol. We discuss the strategies and tactics that can be employed by agents participating in a PADUA dialogue. PADUA is applied to a typical problem in the classification of routine claims for a hypothetical welfare benefit. We particularly address the problems that arise from the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  12.  90
    To know or not to know: epistemic approaches to security protocol verification.Francien Dechesne & Yanjing Wang - 2010 - Synthese 177 (S1):51-76.
    Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the agents. Since BAN-logic, there have been several initiatives and attempts to incorpórate epistemics into the analysis of security protocols. In this paper, we give an overview of work in the field and present it in a unified perspective, with comparisons on technical subtleties that have been employed in different approaches. Also, we study to which degree the use of epistemics is essential for the analysis (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  13. LTL model checking for security protocols.Alessandro Armando, Roberto Carbone & Luca Compagna - 2009 - Journal of Applied Non-Classical Logics 19 (4):403-429.
    Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that greatly complicate or even prevent their applicability in some important cases. For instance, most techniques assume that communication between honest principals is controlled by a Dolev-Yao intruder, i.e. a malicious agent capable to overhear, divert, and fake messages. Yet we might be interested in establishing the security of a protocol that relies on a less unsecure channel (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  46
    Hohfeld in cyberspace and other applications of normative reasoning in agent technology.Christen Krogh & Henning Herrestad - 1999 - Artificial Intelligence and Law 7 (1):81-96.
    Two areas of importance for agents and multiagent systems are investigated: design of agent programming languages, and design of agent communication languages. The paper contributes in the above mentioned areas by demonstrating improved or novel applications for deontic logic and normative reasoning. Examples are taken from computer-supported cooperative work, and electronic commerce.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  7
    Everyone Knows That Everyone Knows: Gossip Protocols for Super Experts.Hans van Ditmarsch, Malvin Gattinger & Rahim Ramezanian - 2023 - Studia Logica 111 (3):453-499.
    A gossip protocol is a procedure for sharing secrets in a network. The basic action in a gossip protocol is a pairwise message exchange (telephone call) wherein the calling agents exchange all the secrets they know. An agent who knows all secrets is an expert. The usual termination condition is that all agents are experts. Instead, we explore protocols wherein the termination condition is that all agents know that all agents are experts. We call such agents super experts. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  11
    Consensus of Second-Order Heterogeneous Hybrid Multiagent Systems via Event-Triggered Protocols.Hong Zhang, Yanhan Li & Ying Zheng - 2022 - Complexity 2022:1-16.
    This paper investigates the event-based consensus problem for the heterogeneous hybrid multiagent system. First, the heterogeneous hybrid MAS is proposed which contains continuous and discrete-time subsystems with second-order and first-order heterogeneous dynamics. Second, the event-triggered protocols are proposed, which mainly include the event-based control laws and event-triggered conditions for different kinds of agents. Then, the consensus conclusions of fixed topology and switching topologies are obtained based on graph theory and nonnegative matrix theory, which include the constraints on control parameters, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  46
    Towards a multi-agent system for regulated information exchange in crime investigations.Pieter Dijkstra, Floris Bex, Henry Prakken & Kees Vey Mestdagdeh - 2005 - Artificial Intelligence and Law 13 (1):133-151.
    This paper outlines a multi-agent architecture for regulated information exchange of crime investigation data between police forces. Interactions between police officers about information exchange are analysed as negotiation dialogues with embedded persuasion dialogues. An architecture is then proposed consisting of two agents, a requesting agent and a responding agent, and a communication language and protocol with which these agents can interact to promote optimal information exchange while respecting the law. Finally, dialogue policies are defined for the individual (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  18.  33
    Towards a multi-agent system for regulated information exchange in crime investigations.Pieter Dijkstra, Floris Bex, Henry Prakken & Kees de Vey Mestdagh - 2005 - Artificial Intelligence and Law 13 (1):133-151.
    This paper outlines a multi-agent architecture for regulated information exchange of crime investigation data between police forces. Interactions between police officers about information exchange are analysed as negotiation dialogues with embedded persuasion dialogues. An architecture is then proposed consisting of two agents, a requesting agent and a responding agent, and a communication language and protocol with which these agents can interact to promote optimal information exchange while respecting the law. Finally, dialogue policies are defined for the individual (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  33
    Social Epistemology and Validation in Agent-Based Social Simulation.David Anzola - 2021 - Philosophy and Technology 34 (4):1333-1361.
    The literature in agent-based social simulation suggests that a model is validated when it is shown to ‘successfully’, ‘adequately’ or ‘satisfactorily’ represent the target phenomenon. The notion of ‘successful’, ‘adequate’ or ‘satisfactory’ representation, however, is both underspecified and difficult to generalise, in part, because practitioners use a multiplicity of criteria to judge representation, some of which are not entirely dependent on the testing of a computational model during validation processes. This article argues that practitioners should address social epistemology to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  44
    Executable specification of open multi-agent systems.Alexander Artikis & Marek Sergot - 2010 - Logic Journal of the IGPL 18 (1):31-65.
    Multi-agent systems where the agents are developed by parties with competing interests, and where there is no access to an agent’s internal state, are often classified as ‘open’. The members of such systems may inadvertently fail to, or even deliberately choose not to, conform to the system specification. Consequently, it is necessary to specify the normative relations that may exist between the members, such as permission, obligation, and institutional power. We present a framework being developed for executable specification (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  12
    Genes and genomes: High‐frequency induction of chromosomal rearrangements in mouse germ cells by the chemotherapeutic agent chlorambucil.Eugene M. Rinchik, Lorraine Flaherty & Liane B. Russell - 1993 - Bioessays 15 (12):831-836.
    Recent mutagenesis studies have demonstrated that the chemotherapeutic agent, chlorambucll (CHL), is highly mutagenic in male germ cells of the mouse. Post‐melotic germ cells, and especially early spermatids, are the most sensitive to the cytotoxic and mutagenic effects of this agent. Genetic, cytogenetic and molecular analyses of many induced mutations have shown that, in these germ‐cell stages, CHL induces predominantly chromosomal rearrangements (deletions and translocations), and mutation‐rate studies show that, in terms of tolerated doses, CHL is perhaps five (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  46
    The moral economy of Saint Thomas Aquinas: Agent sovereignty, customary law and market convention.John R. Owen - 2007 - The European Legacy 12 (1):39-54.
    The ethical authority carried in the conventions of fairness and human well-being has been widely adopted under the idea of “moral economy,” forming an eclectic and interdisciplinary debate. Significant, though external to this debate, is a corpus of medieval thought which exhibits a fundamental interest in legitimate market protocols, and the political rights and obligations of agents in relation to the common good of the community. This article asserts the imperative status of a customary basis for understanding not just (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23. Protocolo de prevención de caídas.Fall Prevention Protocol - forthcoming - Horizonte.
     
    Export citation  
     
    Bookmark  
  24. Knowledge and planning in an action-based multi-agent framework: A case study.Oliver Schulte - unknown
    The situation calculus is a logical formalism that has been extensively developed for planning. We apply the formalism in a complex multi-agent domain, modelled on the game of Clue. We find that the situation calculus, with suitable extensions, supplies a unified representation of (1) the interaction protocol, or structure of the game, (2) the dynamics of the knowledge and common knowledge of the agents, and (3) principles of strategic planning.
    No categories
     
    Export citation  
     
    Bookmark  
  25.  8
    Intermittent Time-Varying Formation Control for High-Order Networked Agents Subject to Discontinuous Communications.Lixin Wang, Zhe Luo, Xiaoqiang Li, Xinsan Li & Xiaogang Yang - 2021 - Complexity 2021:1-14.
    This paper investigates the leaderless and leader-follower time-varying formation design and analysis problems for a group of networked agents subject to discontinuous communications. Firstly, a leaderless time-varying formation control protocol is proposed via the intermittent control strategy, where the control input of each agent is constructed by the distributed local state information and formation instructions in the communication time unit, but it is zero in the noncommunication time unit. Then, an explicit formulation of the formation center function is determined (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26. A communication algorithm for teamwork in multi-agent environments.Egon van Baars & Rineke Verbrugge - 2009 - Journal of Applied Non-Classical Logics 19 (4):431-461.
    Using a knowledge-based approach, we derive a protocol, MACOM1, for the sequence transmission problem from one agent to a group of agents. The protocol is correct for communication media where deletion and reordering errors may occur. Furthermore, it is shown that after k rounds the agents in the group attain depth k general knowledge about the members of the group and the values of the messages. Then, we adjust this algorithm for multi-agent communication for the process of teamwork. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  27.  17
    Network Working Group B. Callaghan Request for Comments: 1813 B. Pawlowski Category: Informational P. Staubach Sun Microsystems, Inc. June 1995. [REVIEW]Protocol Specification - 1995 - Philosophy 8:1-7.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  28. E-Mail Address genevold@ wfubmc. edu.N. C. I. Supplied Agent - 2005 - IRB: Ethics & Human Research 3:16.
    No categories
     
    Export citation  
     
    Bookmark  
  29. Australasian Journal of Philosophy Contents of Volume 90.Darkness Visible, Against Normative Naturalism & Why Be an Agent - 2012 - Australasian Journal of Philosophy 90 (4).
    No categories
     
    Export citation  
     
    Bookmark  
  30.  48
    Knowledge condition games.Sieuwert van Otterloo, Wiebe Van Der Hoek & Michael Wooldridge - 2006 - Journal of Logic, Language and Information 15 (4):425-452.
    Understanding the flow of knowledge in multi-agent protocols is essential when proving the correctness or security of such protocols. Current logical approaches, often based on model checking, are well suited for modeling knowledge in systems where agents do not act strategically. Things become more complicated in strategic settings. In this paper we show that such situations can be understood as a special type of game – a knowledge condition game – in which a coalition “wins” if it (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  7
    Knowledge Condition Games.Sieuwert Otterloo, Wiebe Hoek & Michael Wooldridge - 2006 - Journal of Logic, Language and Information 15 (4):425-452.
    Understanding the flow of knowledge in multi-agent protocols is essential when proving the correctness or security of such protocols. Current logical approaches, often based on model checking, are well suited for modeling knowledge in systems where agents do not act strategically. Things become more complicated in strategic settings. In this paper we show that such situations can be understood as a special type of game – a knowledge condition game – in which a coalition “wins” if it (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32. Moral Machines: Teaching Robots Right From Wrong.Wendell Wallach & Colin Allen - 2008 - New York, US: Oxford University Press.
    Computers are already approving financial transactions, controlling electrical supplies, and driving trains. Soon, service robots will be taking care of the elderly in their homes, and military robots will have their own targeting and firing protocols. Colin Allen and Wendell Wallach argue that as robots take on more and more responsibility, they must be programmed with moral decision-making abilities, for our own safety. Taking a fast paced tour through the latest thinking about philosophical ethics and artificial intelligence, the authors (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   179 citations  
  33.  78
    A knowledge based semantics of messages.Rohit Parikh & Ramaswamy Ramanujam - 2003 - Journal of Logic, Language and Information 12 (4):453-467.
    We investigate the semantics of messages, and argue that the meaning ofa message is naturally and usefully given in terms of how it affects theknowledge of the agents involved in the communication. We note thatthis semantics depends on the protocol used by the agents, and thus not only the message itself, but also the protocol appears as a parameter in the meaning. Understanding this dependence allows us to give formal explanations of a wide variety of notions including language dependence, implicature, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   60 citations  
  34.  15
    競り上げオークションにおける情報顕示の促進. 松原繁夫 - 2001 - Transactions of the Japanese Society for Artificial Intelligence 16 (6):473-482.
    An ascending-bid auction protocol with a fixed end time has been widely used in many Internet auction sites. In such auctions, we can observe bidders’ behavior called last minute bidding, namely, a large fraction of bids are submitted in the closing seconds of the auction. This may cause a problem of information revelation failure as well as a problem of the server’s overload and network congestion. If almost all bids are submitted only during the last minute, each bidder cannot obtain (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  12
    Explanation–Question–Response dialogue: An argumentative tool for explainable AI.Federico Castagna, Peter McBurney & Simon Parsons - forthcoming - Argument and Computation:1-23.
    Advancements and deployments of AI-based systems, especially Deep Learning-driven generative language models, have accomplished impressive results over the past few years. Nevertheless, these remarkable achievements are intertwined with a related fear that such technologies might lead to a general relinquishing of our lives’s control to AIs. This concern, which also motivates the increasing interest in the eXplainable Artificial Intelligence (XAI) research field, is mostly caused by the opacity of the output of deep learning systems and the way that it is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  18
    Heris: ユーザグループと www の統合的情報検索システム.Yamada Seiji Mase Motohiro - 2002 - Transactions of the Japanese Society for Artificial Intelligence 17:127-134.
    In this paper, we propose a framework for searching information through both the WWW and a human group. Though information retrieval using a searc engine in the WWW is very useful, we can not acquire local information owned by persons and not explicitly described in text. A user knows neither where target information is in the WWW nor who knows in a human group. Thus we integrate the information retrieval in the WWW with that in a human group, develop a (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37. How Could We Know Whether Nonhuman Primates Understand Others’ Internal Goals and Intentions? Solving Povinelli’s Problem.Robert W. Lurz & Carla Krachun - 2011 - Review of Philosophy and Psychology 2 (3):449-481.
    A persistent methodological problem in primate social cognition research has been how to determine experimentally whether primates represent the internal goals of other agents or just the external goals of their actions. This is an instance of Daniel Povinelli’s more general challenge that no experimental protocol currently used in the field is capable of distinguishing genuine mindreading animals from their complementary behavior-reading counterparts. We argue that current methods used to test for internal-goal attribution in primates do not solve Povinelli’s problem. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  38.  12
    Everyone Knows that Everyone Knows.Rahim Ramezanian, Rasoul Ramezanian, Hans van Ditmarsch & Malvin Gattinger - 2021 - In Mojtaba Mojtahedi, Shahid Rahman & MohammadSaleh Zarepour (eds.), Mathematics, Logic, and their Philosophies: Essays in Honour of Mohammad Ardeshir. Springer. pp. 117-133.
    A gossip protocolGossip protocol is a procedure for sharing secrets in a network. The basic action in a gossip protocolGossip protocol is a telephone call wherein the caller and the callee exchange all the secrets they know. An agent who knows all secrets is an expert. The usual termination condition is that all agents are experts. Instead, we explore some protocols wherein the termination condition is that all agents know that all agents are experts. We call such agents (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  64
    Normative autonomy and normative co-ordination: Declarative power, representation, and mandate. [REVIEW]Jonathan Gelati, Antonino Rotolo, Giovanni Sartor & Guido Governatori - 2004 - Artificial Intelligence and Law 12 (1-2):53-81.
    In this paper we provide a formal analysis of the idea of normative co-ordination. We argue that this idea is based on the assumption that agents can achieve flexible co-ordination by conferring normative positions to other agents. These positions include duties, permissions, and powers. In particular, we explain the idea of declarative power, which consists in the capacity of the power-holder of creating normative positions, involving other agents, simply by proclaiming such positions. In addition, we account also for the concepts (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  40.  67
    ‘How can we tell it to the children?’ A deliberation at the Institute of Social Research.David Kettler & Thomas Wheatland - 2012 - Thesis Eleven 111 (1):110-122.
    To introduce an archival protocol of a ‘Debate about methods in the social sciences, especially the conception of social science method represented by the Institute’, held on 17 January 1941 at the Institute of Social Research in New York, the article focuses on certain conflicts in substance and terms of discourse among members of the Institute, with special emphasis on Franz Neumann’s distinctive approaches, notwithstanding his professed loyalty to Max Horkheimer’s theory. These are seen to arise not only from Neumann’s (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  18
    架空名義入札に頑健な公開競上げ式複数同一財オークションプロトコル.横尾 真 岩崎 敦 - 2004 - Transactions of the Japanese Society for Artificial Intelligence 19:334-342.
    This paper develops a new ascending-price multi-unit auction protocol that has following characteristics: it has an open format, sincere bidding is an equilibrium strategy even if the marginal utilities of each agent can increase and agents can submit false-name bids. False-name bids are bids submitted under fictitious names such as multiple e-mail addresses, which can be done easily in the Internet. This is the first protocol that has these two characteristics. We show that our new protocol outperforms an existing (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  13
    日常言語コンピューティング (第2報)―日常言語に基づく計算機資源の管理・実行環境を目指して―.小林 一郎 岩爪 道昭 - 2003 - Transactions of the Japanese Society for Artificial Intelligence 18:45-56.
    The a Everyday language computing is a new computational paradigm that all people, from small children to aged persons, can access and use computing systems with his/her own everyday language. As a way to realize ELC, we proposed a framework of language-based operating system, and we are now working intensively to develop the fundamental part of it. In this paper, we report our status of research on LOS. One of the main components of LOS is the semiotic base, which is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  14
    架空名義入札に頑健な複数ユニットオークションプロトコル.櫻井 祐子 横尾 真 - 2002 - Transactions of the Japanese Society for Artificial Intelligence 17:390-397.
    This paper presents a new multi-unit auction protocol that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  8
    Motion and representation: the language of human movement.Nicolás Salazar Sutil - 2015 - Cambridge, Massachusetts: MIT Press.
    An examination of the ways human movement can be represented as a formal language and how this language can be mediated technologically. In Motion and Representation, Nicolás Salazar Sutil considers the representation of human motion through languages of movement and technological mediation. He argues that technology transforms the representation of movement and that representation in turn transforms the way we move and what we understand to be movement. Humans communicate through movement, physically and mentally. To record and capture integrated movement (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  45.  71
    Primer on an ethics of AI-based decision support systems in the clinic.Matthias Braun, Patrik Hummel, Susanne Beck & Peter Dabrock - 2021 - Journal of Medical Ethics 47 (12):3-3.
    Making good decisions in extremely complex and difficult processes and situations has always been both a key task as well as a challenge in the clinic and has led to a large amount of clinical, legal and ethical routines, protocols and reflections in order to guarantee fair, participatory and up-to-date pathways for clinical decision-making. Nevertheless, the complexity of processes and physical phenomena, time as well as economic constraints and not least further endeavours as well as achievements in medicine and (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  46. Merging Frameworks for Interaction.Johan van Benthem Jelle Gerbrandy - unknown
    Many logical systems today describe intelligent interacting agents over time. Frameworks include Interpreted Systems (IS, Fagin et al. [8]), Epistemic-Temporal Logic (ETL, Parikh & Ramanujam [22]), STIT (Belnap et al. [5]), Process Algebra and Game Semantics (Abramsky [1]). This variety is an asset, as different modeling tools can be fine-tuned to specific applications. But it may also be an obstacle, when barriers between paradigms and schools go up. This paper takes a closer look at one particular interface, between two systems (...)
     
    Export citation  
     
    Bookmark   37 citations  
  47.  79
    Merging frameworks for interaction.Johan van Benthem, Jelle Gerbrandy, Tomohiro Hoshi & Eric Pacuit - 2009 - Journal of Philosophical Logic 38 (5):491-526.
    A variety of logical frameworks have been developed to study rational agents interacting over time. This paper takes a closer look at one particular interface, between two systems that both address the dynamics of knowledge and information flow. The first is Epistemic Temporal Logic (ETL) which uses linear or branching time models with added epistemic structure induced by agents’ different capabilities for observing events. The second framework is Dynamic Epistemic Logic (DEL) that describes interactive processes in terms of epistemic event (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   71 citations  
  48.  10
    Merging Frameworks for Interaction.Johan Benthem, Jelle Gerbrandy, Tomohiro Hoshi & Eric Pacuit - 2009 - Journal of Philosophical Logic 38 (5):491-526.
    A variety of logical frameworks have been developed to study rational agents interacting over time. This paper takes a closer look at one particular interface, between two systems that both address the dynamics of knowledge and information flow. The first is Epistemic Temporal Logic (ETL) which uses linear or branching time models with added epistemic structure induced by agents’ different capabilities for observing events. The second framework is Dynamic Epistemic Logic (DEL) that describes interactive processes in terms of epistemic event (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   32 citations  
  49. Computational Representation of Practical Argument.Katie Atkinson, Trevor Bench-Capon & Peter McBurney - 2006 - Synthese 152 (2):157-206.
    In this paper we consider persuasion in the context of practical reasoning, and discuss the problems associated with construing reasoning about actions in a manner similar to reasoning about beliefs. We propose a perspective on practical reasoning as presumptive justification of a course of action, along with critical questions of this justification, building on the account of Walton. From this perspective, we articulate an interaction protocol, which we call PARMA, for dialogues over proposed actions based on this theory. We outline (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   36 citations  
  50.  74
    Toward a Dynamic Logic of Questions.Johan van Benthem & Ştefan Minică - 2012 - Journal of Philosophical Logic 41 (4):633-669.
    Questions are triggers for explicit events of ‘issue management’. We give a complete logic in dynamic-epistemic style for events of raising, refining, and resolving an issue, all in the presence of information flow through observation or communication. We explore extensions of the framework to multi-agent scenarios and long-term temporal protocols. We sketch a comparison with some alternative accounts.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   31 citations  
1 — 50 / 1000