An agents establishes trust with equitable information revelation

DSpace/Manakin Repository

Search OPUS


Advanced Search

Browse

My Account

Show simple item record

dc.contributor.author Debenham, JK
dc.contributor.author Simoff, SJ
dc.contributor.editor N/A
dc.date.accessioned 2009-11-09T05:36:01Z
dc.date.issued 2005-01
dc.identifier.citation Proceedings of 2005 IEEE 2Nd Symposium On Multi-Agent Security And Survivability, 2005, pp. 66 - 74
dc.identifier.isbn 078039447-X
dc.identifier.other E1 en_US
dc.identifier.uri http://hdl.handle.net/10453/2609
dc.description.abstract Negotiation is an information exchange process as well as an offer exchange process. Theories of competitive negotiation are typically founded on game theory where the agent's utility function is the focus. If an agent is uncertain of the integrity of its information then it may not know its utility with certainty. Here what an agent knows and how certain it is of what it knows are modelled using tools from information theory that are applied to value information. An agent attempts to instil a sense trust in its opponent by revealing information of comparable 'value' in its responses to that which it has received. Each proposal and claim exchanged reveals valuable information about the sender's position. A negotiation may break down if an agent believes that its opponent is not playing fairly. The agent aims to give the impression of fair play by responding with comparable information revelation whilst playing strategically to influence its opponent's preferences with claims. The agent makes no assumptions about the internals of its opponent, including her motivations, logic, and whether she is conscious of a utility function
dc.publisher IEEE
dc.relation.isbasedon 10.1109/MASSUR.2005.1507049
dc.title An agents establishes trust with equitable information revelation
dc.type Conference Proceeding
dc.parent Proceedings of 2005 IEEE 2Nd Symposium On Multi-Agent Security And Survivability
dc.journal.number en_US
dc.publocation PA, USA en_US
dc.identifier.startpage 66 en_US
dc.identifier.endpage 74 en_US
dc.cauo.name FEIT.School of Software en_US
dc.conference Verified OK en_US
dc.conference IEEE Symposium on Multi-Agent Security and Survivability
dc.conference.location Philadelphia, PA, USA en_US
dc.for 080109 Pattern Recognition and Data Mining
dc.for 150307 Innovation and Technology Management
dc.for 150399 Business and Management Not Elsewhere Classified
dc.personcode 723535
dc.personcode 000716
dc.percentage 60 en_US
dc.classification.name Pattern Recognition and Data Mining en_US
dc.classification.type FOR-08 en_US
dc.custom IEEE Symposium on Multi-Agent Security and Survivability en_US
dc.date.activity 20050830 en_US
dc.date.activity 2005-08-30
dc.location.activity Philadelphia, PA, USA en_US
dc.description.keywords modelling trust, maximum entrophy influence, argumentation, multi-agent system en_US
pubs.embargo.period Not known
pubs.organisational-group /University of Technology Sydney
pubs.organisational-group /University of Technology Sydney/Faculty of Engineering and Information Technology
pubs.organisational-group /University of Technology Sydney/Faculty of Engineering and Information Technology/School of Software
pubs.organisational-group /University of Technology Sydney/Strength - Quantum Computation and Intelligent Systems
utslib.copyright.status Closed Access
utslib.copyright.date 2015-04-15 12:17:09.805752+10
utslib.collection.history School of Software (ID: 337)
utslib.collection.history Closed (ID: 3)


Files in this item

This item appears in the following Collection(s)

Show simple item record