![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
DIPP: Diffusion of Privacy Preferences in Online Social Networks
Ensuring the privacy of users is a key component in various computer systems such as online social networks, where users often share content, possibly intended only for a certain audience but not others. The c...
-
Chapter and Conference Paper
Computational Theory of Mind for Human-Agent Coordination
In everyday life, people often depend on their theory of mind, i.e., their ability to reason about unobservable mental content of others to understand, explain, and predict their behaviour. Many agent-based mo...
-
Chapter and Conference Paper
Collaborative Privacy Management with Auctioning Mechanisms
Online social networks enable users to share content with other users. Many times, a shared content, such as a group picture, may reveal private information about the uploader as well as others who are associa...
-
Article
Open AccessAssisting humans in privacy management: an agent-based approach
Image sharing is a service offered by many online social networks. In order to preserve privacy of images, users need to think through and specify a privacy setting for each image that they upload. This is dif...
-
Chapter and Conference Paper
Agents for Preserving Privacy: Learning and Decision Making Collaboratively
Privacy is a right of individuals to keep personal information to themselves. Often online systems enable their users to select what information they would like to share with others and what information to kee...
-
Chapter and Conference Paper
Emergent Privacy Norms for Collaborative Systems
Managing privacy of users in online systems is a major aspect of cyber-security. Typical approaches to privacy are concerned with giving users options of informed consent, wherein users define their private d...
-
Article
PISAGOR: a proactive software agent for monitoring interactions
E-commerce has become an integral part of everyday life. Many e-commerce systems enable users to browse products, place orders, and track deliveries online. However, these interactions is time-consuming, espec...
-
Chapter and Conference Paper
PriGuardTool: A Web-Based Tool to Detect Privacy Violations Semantically
Online social networks contain plethora of information about its users. While users enjoy sharing information online, not all information is meant to be seen by the entire network. Managing the privacy of user...
-
Article
Heuristics for using CP-nets in utility-based negotiation without knowing utilities
CP-nets have proven to be an effective representation for capturing preferences. However, their use in automated negotiation is not straightforward because, typically, preferences in CP-nets are partially orde...
-
Article
Dynamically generated commitment protocols in open systems
Agent interaction is a fundamental part of any multiagent system. Such interactions are usually regulated by protocols, which are typically defined at design-time. However, in many situations a protocol may no...
-
Chapter and Conference Paper
Negotiating Privacy Constraints in Online Social Networks
Privacy is a major concern of Web systems. Traditional Web systems employ static privacy agreements to notify its users of how their information will be used. Recent social networks allow users to specify some...
-
Article
Detecting and predicting privacy violations in online social networks
Online social networks have become an essential part of social and work life. They enable users to share, discuss, and create content together with various others. Obviously, not all content is meant to be see...
-
Article
Multiagent cooperation for solving global optimization problems: an extendible framework with example cooperation strategies
This paper proposes the use of multiagent cooperation for solving global optimization problems through the introduction of a new multiagent environment, MANGO. The strength of the environment lays in its flexi...
-
Article
Constraint satisfaction as a tool for modeling and checking feasibility of multiagent commitments
Commitments are being used to specify interactions among autonomous agents in multiagent systems. Various formalizations of commitments have shown their strength in representing and reasoning on multiagent int...
-
Chapter
Heuristic-Based Approaches for CP-Nets in Negotiation
CP-Nets have proven to be an effective representation for capturing preferences. However, their use in multiagent negotiation is not straightforward. The main reason for this is that CP-Nets capture partial or...
-
Chapter and Conference Paper
Commitment Protocol Generation
Multiagent systems contain agents that interact with each other to carry out their activities. The agents’ interactions are usually regulated with protocols that are assumed to be defined by designers at desig...
-
Article
Automating user reviews using ontologies: an agent-based approach
The Web is becoming a global market place, where the same services and products are offered by different providers. When obtaining a service, consumers have to select one provider among many alternatives to re...
-
Chapter and Conference Paper
Detecting Conflicts in Commitments
Commitments are being used widely to specify interaction among autonomous agents in multiagent systems. While various formalizations for a commitment and its life cycle exist, there has been little work that s...
-
Chapter
The Effect of Preference Representation on Learning Preferences in Negotiation
In online and dynamic e-commerce environments, it is beneficial for parties to consider each other’s preferences in carrying out transactions. This is especially important when parties are negotiating, since c...
-
Chapter and Conference Paper
Improving Self-organized Resource Allocation with Effective Communication
Distributed resource allocation in multiagent systems is hard to solve. Since the allocation will be done distributively, agents are not aware of others that use the resources that they need and in what quanti...