نتایج جستجو برای: contract net protocol
تعداد نتایج: 386975 فیلتر نتایج به سال:
Novel contract signing protocol based on the OTPK scheme were recommended. OTPK means one time password key. This recommended protocol capable will be brought into action only if one party fails to sign the to permit two parties to sign the matching contract and then those parties can exchange their digital signatures. The protocol proficient to ensure fairness in and it offers parties with gre...
We introduce the notion of abuse-free distributed contract signing, that is, distributed contract signing in which no party ever can prove to a third party that he is capable of choosing whether to validate or invalidate the contract. Assume Alice and Bob are signing a contract. If the contract protocol they use is not abuse-free, then it is possible for one party, say Alice, at some point to c...
We compare four approaches to network neutrality and network management regulation in a two-sided market model: (i) no variations in Quality of Service and no price discrimination; (ii) variations in Quality of Service but no price discrimination; (iii) variations in Quality of Service and price discrimination but no exclusive contracts; and (iv) no regulation: the network operator can sell exc...
-Electronic contract-signing is an important issue in Electronic Commerce. This paper proposed a novel abuse-free contract signing protocol based on convertible signature and non-interactive designated verifier proof. One interesting property is that the outcome evidences are standard RSA signatures, which makes the protocol be easily integrated into existing systems.
In this paper, we propose a Caching Neighborhood Protocol (CNP) that describes an infrastructure upon which proxy servers can build dynamic caching hierarchies. Compared to the conventional schemes based on static caching hierarchies where proxy servers can only communicate with each other following predefined path configurations, the proposed dynamic scheme permits flexible communications amon...
Using model checking to verify that interaction protocols have given properties is widely recognized as an important issue in multiagent systems where autonomous and heterogeneous agents need to successfully regulate and coordinate their interactions. In this paper, we investigate the use of symbolic model checkers to verify the compliance of a special kind of interaction protocols called commi...
The paper has analyzed production-related aspects of broiler farming under contract and independent management, and has examined inputs and services provision arrangements. About two-thirds of the contracts are of long duration of three years, and the remaining are of two years or eleven months duration. Surprisingly, none of the contract farmer possesses a copy of the agreement with him. The a...
This paper focuses on the reuse of agent components in open multi-agent systems, and argues that the traditional approaches used in software multiagent systems are limited and not rigorous. On this basis, we propose a formal framework for the definition of behavioural reuse in agent components systems. This framework is based upon the preorder relations which are considered in the study of conc...
The article analyzes network effects on the German GSM mobile telephony market. The authors use an ACE-approach to examine how a new competitor can successfully gain ground in the market with a discount-pricing strategy. In particular they study the impact of several elements of a mobile phone contract like on-net-, landlineor off-net-fees on the competitor’s market share. It turns out that it ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید