Search
Now showing items 21-30 of 39
Trust estimation of sources over correlated propositions
(IEEE, 2018-09-05)
This work analyzes the impact of correlated propositions when estimating the reporting behavior of information sources. These behavior estimates are critical for fusion, and traditional methods assume the propositions are ...
Interest-based negotiation for policy-regulated asset sharing
(Springer Nature, 2016)
Resources sharing is an important but complex problem to be solved. The problem is exacerbated in a coalition context due to policy constraints, that reflect concerns regarding security, privacy and performance to name a ...
Preface
(Springer International Publishing, 2016)
The pervasiveness of open systems raises a range of challenges and opportunities for research and technological development in the area of autonomous agents and multi-agent systems. Open systems comprise loosely coupled ...
How to trust a few among many
(Springer International Publishing, 2017)
The presence of numerous and disparate information sources available to support decision-making calls for efficient methods of harnessing their potential. Information sources may be unreliable, and misleading reports can ...
Privacy enforcement through policy extension
(IEEE, 2016)
Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility ...
Semantic reasoning with uncertain information from unreliable sources
(Springer International Publishing, 2016)
Intelligent software agents may significantly benefit from semantic reasoning. However, existing semantic reasoners are based on Description Logics, which cannot handle vague, incomplete, and unreliable knowledge. In this ...
Reasoning about uncertain information and conflict resolution through trust revision
(International Foundation for Autonomous Agents and Multiagent Systems, 2013)
In information driven MAS, information consumers collect information about their environment from various sources such as sensors. However, there is no guarantee that a source will provide the requested information truthfully ...
Location attestation and access control for mobile devices using GeoXACML
(Elsevier, 2017-02)
Access control has been applied in various scenarios in the past for negotiating the best policy. Solutions with XACML for access control has been very well explored by research and have resulted in significant contributions ...
Evidential deep learning to quantify classification uncertainty
(Neural Information Processing Systems Foundation, 2018)
Deterministic neural nets have been shown to learn effective predictors on a wide range of machine learning problems. However, as the standard approach is to train the network to minimize a prediction loss, the resultant ...
Share this page