Weighting Estimation Methods for Opponents' Utility Functions Using Boosting in Multi-Time Negotiations

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Transfer Learning to Model Unknown Opponents in Automated Negotiations

Modeling unknown opponents is known as a key factor for the efficiency of automated negotiations. The learning processes are however challenging because of (1) the indirect way the target function can be observed, and (2) the limited amount of experience available to learn from an unknown opponent at a single session. To address these difficulties we propose to adopt two approaches from transfe...

متن کامل

Efficacy of Symmetrical and Asymmetrical Pushed Negotiations in Boosting Speaking

This study was set out to shed light on the efficacy of pushed output directed by scaffolding on 41 (24 female and 17 male) upper-intermediate EFL learners’ speaking fluency and accuracy. A public version of IELTS speaking test was held to measure learners’ entrance behavior. Then, they were randomly assigned into symmetrical, asymmetrical, and control group. The experimental and control groups...

متن کامل

A decentralized model for automated multi-attribute negotiations with incomplete information and general utility functions

This paper presents a decentralized model that allows self-interested agents to reach “win-win” agreements in a multi-attribute negotiation. The model is based on an alternating-offer protocol. In each period, the proposing agent is allowed to make a limited number of offers. The responding agent can select the best out of these offers. In the case of rejection, agents exchange their roles and ...

متن کامل

Multi-Class Classification Fusion using Boosting for Identifying Steganography Methods

There are over 250 image steganography methods available on the Internet. In digital image steganalysis an analyst has three goals, first determine if an embedded message exists, next determine the embedding method used to create the stego image and finally extract the hidden message. The objective of this paper lies on the second goal, that is, to identify the embedding technique used to creat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEICE Transactions on Information and Systems

سال: 2018

ISSN: 0916-8532,1745-1361

DOI: 10.1587/transinf.2018edp7056