Conflict Management with an Authority/Deniability Model

نویسندگان

  • Mihai Barbuceanu
  • Mark S. Fox
چکیده

When a reasoning system encounters a contradiction like p&q=>false, it may try to eliminate it by retracting some belief that supports either p or q. This paper addresses the issue of how to determine which of the possible supporting beliefs to retract. The problem is studied in the context of a heterogenous distributed environment in which we can not make assumptions about how agents derive their beliefs. The presented model considers two properties of beliefs: the authority of the agents that provided the belief in the first place and the costs incurred upon other agents that already used the belief (directly or indirectly) for their own decision making or action, if the belief is to be retracted. The model is implemented in an information infrastructure we have created for enterprise integration.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The persistence of cliques in the post-communist state. The case of deniability in drug reimbursement policy in Poland.

This article explores a key question in political sociology: Can post-communist policy-making be described with classical theories of the Western state or do we need a theory of the specificity of the post-communist state? In so doing, we consider Janine Wedel's clique theory, concerned with informal social actors and processes in post-communist transition. We conducted a case study of drug rei...

متن کامل

Deniable Functional Encryption

Deniable encryption, first introduced by Canetti et al. (CRYPTO 1997), allows a sender and/or receiver of encrypted communication to produce fake but authentic-looking coins and/or secret keys that “open” the communication to a different message. Here we initiate its study for the more general case of functional encryption (FE), as introduced by Boneh et al. (TCC 2011), wherein a receiver in po...

متن کامل

Authority management in human-robot systems

In the context of missions accomplished jointly by an artifical agent and a human agent, we focus on a controller of the authority dynamics based on a dependence graph of resources that can be controlled by both agents. The controller is designed to adapt the behaviours of the artificial agent or of the human agent in case of an authority conflict occurring on these resources. The relative auth...

متن کامل

A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem

Recently, many non-interactive deniable authentication (NIDA) protocols have been proposed. They are mainly composed of two types, signature-based and shared-secrecy based. After reviewing these schemes, we found that the signature-based approach can not deny the source of the message and thus can not achieve full deniability; and that, the shared-secrecy based approach suffers KCI attack altho...

متن کامل

Fuzzy Complexity Analysis with Conflict Resolution for Educational Projects

Evaluative and comparative analysis among educational projects remains an issue for administration, program directors, instructors, and educational institutes. This study reports a fuzzy complexity model for educational projects, which has two primary aspects (technical aspects and transparency aspects). These aspects may not be measured precisely due to uncertain situations. Therefore, a fuzzy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002