Weighting Estimation Methods for Opponents' Utility Functions Using Boosting in Multi-Time Negotiations
نویسندگان
چکیده
منابع مشابه
Using Transfer Learning to Model Unknown Opponents in Automated Negotiations
Modeling unknown opponents is known as a key factor for the efficiency of automated negotiations. The learning processes are however challenging because of (1) the indirect way the target function can be observed, and (2) the limited amount of experience available to learn from an unknown opponent at a single session. To address these difficulties we propose to adopt two approaches from transfe...
متن کاملEfficacy of Symmetrical and Asymmetrical Pushed Negotiations in Boosting Speaking
This study was set out to shed light on the efficacy of pushed output directed by scaffolding on 41 (24 female and 17 male) upper-intermediate EFL learners’ speaking fluency and accuracy. A public version of IELTS speaking test was held to measure learners’ entrance behavior. Then, they were randomly assigned into symmetrical, asymmetrical, and control group. The experimental and control groups...
متن کاملA decentralized model for automated multi-attribute negotiations with incomplete information and general utility functions
This paper presents a decentralized model that allows self-interested agents to reach “win-win” agreements in a multi-attribute negotiation. The model is based on an alternating-offer protocol. In each period, the proposing agent is allowed to make a limited number of offers. The responding agent can select the best out of these offers. In the case of rejection, agents exchange their roles and ...
متن کاملMulti-Class Classification Fusion using Boosting for Identifying Steganography Methods
There are over 250 image steganography methods available on the Internet. In digital image steganalysis an analyst has three goals, first determine if an embedded message exists, next determine the embedding method used to create the stego image and finally extract the hidden message. The objective of this paper lies on the second goal, that is, to identify the embedding technique used to creat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2018
ISSN: 0916-8532,1745-1361
DOI: 10.1587/transinf.2018edp7056