<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Avoiding Malicious Agents in E-Commerce Using Fuzzy Recommendations</style></title><secondary-title><style face="normal" font="default" size="100%"> Journal of Organizational Computing and Electronic Commerce</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">101-117</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Convergence of agent reputation with Alpha-Beta filtering vs. a fuzzy system</style></title><secondary-title><style face="normal" font="default" size="100%">Computational Intelligence for Modelling, Control and Automation, International Conference on (2005)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Nov. 28-30, 2005</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Vienna, Austria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Decision Model Analysis for Spam</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">151-161</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">One of the security challenges in e-Government is to offer a smooth dialogue with citizens, which guarantees the availability, confidentiality and integrity of the information interchanged. Spam jeopardizes the survival of electronic mail as a communication means. Many approaches to tackle the problem with spam have been proposed. This paper shows the necessity of studying the real value of spam filters. Contrary to common belief, false positive rate and false negative rate do not completely reveal to what extent a junk filter is worth using. Very important parameters like the hostility of the environment (summarized by the probability of receiving spam) or the error costs associated with the filter play a decisive role.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Fuzzy counter-offers in agent-mediated negotiations </style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Intelligent &amp; Fuzzy Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">125-131</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Machine Learning Based Evaluation of a Negotiation between Agents Involving Fuzzy Counter-Offers</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Web Intelligence First International AtlanticWeb Intelligence Conference, AWIC 2003</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 5–6, 2003</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Madrid, Spain</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Argumentative Negotiations with Anonymous Informer Agents</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><volume><style face="normal" font="default" size="100%">8</style></volume><pages><style face="normal" font="default" size="100%">194-206</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper we present a scheme of multi-agent argumentative negotiation in the generic domain encompassing intelligence agencies and informers. Two agents, an intelligence agency and a potential informer, negotiate multiple criteria through the sequential exchange of agreement offers and counteroffers. The goal of the negotiation phase in our work is to persuade the other party by argumentative reasons. We have studied several typical arguments, which may be useful in this context, such as ultimatums, promises of future fidelity, past behaviour, and other offerings received. Furthermore, privacy protection is one of the major issues of such negotiation of secrets with informers. This can be accomplished through the exchange of arguments in counteroffer attributes and by using encryption techniques.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Agents arguing about electronic payments in persuasive negotiations</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE International Conference on Systems, Man and Cybernetics</style></secondary-title></titles><dates><pub-dates><date><style  face="normal" font="default" size="100%">6-9 Oct. 2002 </style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Yasmine Hammamet, Tunisia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>