首页 > 最新文献

2008 International Symposium on Electronic Commerce and Security最新文献

英文 中文
The Application of Genetic Algorithm in Vehicle Routing Problem 遗传算法在车辆路径问题中的应用
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.227
Yueqin Zhang, Shiying Chen, Jinfeng Liu, Fu Duan
Genetic Algorithms are excellent approaches to solving complex problem in optimization with difficult constraints. The vehicle routing problem (VRP) has been shown as an NP-complete problem. On the foundation of stressing the limitations of the network in VRP this paper introduces a finite automaton (FA) to produce individual population and implement a new evolution way using genetic algorithm. Besides, the paper shows the application in an urban public transportation system.
遗传算法是解决具有困难约束的复杂优化问题的优秀方法。车辆路径问题(VRP)是一个np完全问题。在强调VRP中网络局限性的基础上,引入有限自动机(FA)产生个体群体,并利用遗传算法实现一种新的进化方式。此外,本文还展示了该系统在城市公共交通系统中的应用。
{"title":"The Application of Genetic Algorithm in Vehicle Routing Problem","authors":"Yueqin Zhang, Shiying Chen, Jinfeng Liu, Fu Duan","doi":"10.1109/ISECS.2008.227","DOIUrl":"https://doi.org/10.1109/ISECS.2008.227","url":null,"abstract":"Genetic Algorithms are excellent approaches to solving complex problem in optimization with difficult constraints. The vehicle routing problem (VRP) has been shown as an NP-complete problem. On the foundation of stressing the limitations of the network in VRP this paper introduces a finite automaton (FA) to produce individual population and implement a new evolution way using genetic algorithm. Besides, the paper shows the application in an urban public transportation system.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114643166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Grid Resource Discovery Scheme Integrated P2P Mode 集成P2P模式的网格资源发现方案研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.58
Z. Xiong, Xuemin Zhang, Jianxin Chen
Resource discovery is the key requirements in large heterogeneous grid environments, and an effective and efficient resource discovery mechanism is crucial. Grid system using P2P technology can improve the central control of the traditional grid and the single point of failure. In this paper, a novel grid resource discovery scheme is proposed, which is integrated P2P mode and agent technology. The scheme can adapt to the complex, heterogeneous and dynamic resources of the grid environment, and has a better scalability.
资源发现是大型异构网格环境中的关键需求,有效的资源发现机制至关重要。采用P2P技术的电网系统可以改善传统电网的集中控制和单点故障。本文提出了一种将P2P模式与代理技术相结合的网格资源发现方案。该方案能够适应网格环境下资源的复杂、异构和动态性,具有较好的可扩展性。
{"title":"Research on Grid Resource Discovery Scheme Integrated P2P Mode","authors":"Z. Xiong, Xuemin Zhang, Jianxin Chen","doi":"10.1109/ISECS.2008.58","DOIUrl":"https://doi.org/10.1109/ISECS.2008.58","url":null,"abstract":"Resource discovery is the key requirements in large heterogeneous grid environments, and an effective and efficient resource discovery mechanism is crucial. Grid system using P2P technology can improve the central control of the traditional grid and the single point of failure. In this paper, a novel grid resource discovery scheme is proposed, which is integrated P2P mode and agent technology. The scheme can adapt to the complex, heterogeneous and dynamic resources of the grid environment, and has a better scalability.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128227327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Extended RBAC Model for Uniform Implementation of Role Hierarchy and Constraint 角色层次与约束统一实现的扩展RBAC模型
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.163
Yi Ren, Zhiting Xiao, Sipei Guo
Role based access control (RBAC) has been widely adopted as a policy neutral access control model by many IT corporations. RBAC96, which is the most famous family of RBAC models, provides a common frame reference for related research and development. Many properties proposed in the family, e.g. limited inheritance, mutually exclusive roles, cardinality, and interaction, have been separately discussed in the previous work. In this paper, an extended RBAC model implementing those properties is proposed to provide an approach for implementing RBAC3. The extended RBAC model is based on deputy mechanism and is called deputy-based access control (DBAC). Since the private role hierarchy and constraint can be uniformly handled in DBAC, a flexible and powerful access control system can be implemented.
基于角色的访问控制(RBAC)作为一种策略中立的访问控制模型已被许多IT企业广泛采用。RBAC96是最著名的RBAC模型家族,为相关研究和开发提供了通用的框架参考。在家族中提出的许多性质,如有限继承、互斥角色、基数性和相互作用,在以前的工作中已经单独讨论过。本文提出了一个实现这些特性的扩展RBAC模型,为实现RBAC3提供了一种方法。扩展的RBAC模型基于代理机制,称为基于代理的访问控制(DBAC)。由于在DBAC中可以统一处理私有角色层次和约束,因此可以实现灵活而强大的访问控制系统。
{"title":"An Extended RBAC Model for Uniform Implementation of Role Hierarchy and Constraint","authors":"Yi Ren, Zhiting Xiao, Sipei Guo","doi":"10.1109/ISECS.2008.163","DOIUrl":"https://doi.org/10.1109/ISECS.2008.163","url":null,"abstract":"Role based access control (RBAC) has been widely adopted as a policy neutral access control model by many IT corporations. RBAC96, which is the most famous family of RBAC models, provides a common frame reference for related research and development. Many properties proposed in the family, e.g. limited inheritance, mutually exclusive roles, cardinality, and interaction, have been separately discussed in the previous work. In this paper, an extended RBAC model implementing those properties is proposed to provide an approach for implementing RBAC3. The extended RBAC model is based on deputy mechanism and is called deputy-based access control (DBAC). Since the private role hierarchy and constraint can be uniformly handled in DBAC, a flexible and powerful access control system can be implemented.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126960149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Entropy Model of Order Degree of Fractal Supply Chain Network 分形供应链网络有序度的熵模型研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.74
Wenfang Sun, Huaizhen Ye
According to the relation between generalized fractal dimension and generalized entropy, obtain entropy through fractal dimension, and expand and improve the system structure entropy model, furthermore, establish entropy model of order degree of FSCN system based on organizational structure entropy and information entropy. Meanwhile, reveal generation and propagation of information accord with fractal growth in DLA model to get information fractal dimension and information entropy. And an example is provided to explain and compare the result. Moreover, entropy mechanism of FSCN system mutation is deduced from entropy model of order degree of FSCN.
根据广义分形维数与广义熵的关系,通过分形维数获得熵,并对系统结构熵模型进行扩展和改进,进一步建立了基于组织结构熵和信息熵的FSCN系统有序度熵模型。同时,揭示DLA模型中信息的生成和传播符合分形增长规律,得到信息的分形维数和信息熵。并通过实例对计算结果进行了说明和比较。并从FSCN有序度熵模型出发,推导了FSCN系统突变的熵机制。
{"title":"Research on Entropy Model of Order Degree of Fractal Supply Chain Network","authors":"Wenfang Sun, Huaizhen Ye","doi":"10.1109/ISECS.2008.74","DOIUrl":"https://doi.org/10.1109/ISECS.2008.74","url":null,"abstract":"According to the relation between generalized fractal dimension and generalized entropy, obtain entropy through fractal dimension, and expand and improve the system structure entropy model, furthermore, establish entropy model of order degree of FSCN system based on organizational structure entropy and information entropy. Meanwhile, reveal generation and propagation of information accord with fractal growth in DLA model to get information fractal dimension and information entropy. And an example is provided to explain and compare the result. Moreover, entropy mechanism of FSCN system mutation is deduced from entropy model of order degree of FSCN.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123772543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reputation-based Trust Update in Network Environment 网络环境下基于声誉的信任更新
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.211
Shufen Peng, Jingsha He, Yao Meng
In a network environment, trust management is an important security issue. A weighted sum is prevalent in trust formalization. Trust is contextual, continuous and changeful. There are many factors that can affect trust update in the whole lifetime of trust. However, these factors have not been studied thoroughly. In this paper, we propose a weighted trust formula and present an integrated trust update method. First, we will compare several recommendation trust formula and analyze the factors that affect trust update. We propose to use abnormal trust value sequence and statistical analysis to detect malicious recommenders and false recommendation trust values in the whole lifetime of trust. Assuming that direct trust weight and recommendation trust weight are independent from each other, we propose a real-time weight update method through trust value sequences. Simulation results show that our method could effectively detect malicious recommenders and malicious recommendation trust values and make trust value sequence smoother.
在网络环境中,信任管理是一个重要的安全问题。加权和在信托形式化中很普遍。信任是有背景的、持续的和变化的。在信任的整个生命周期中,影响信任更新的因素有很多。然而,这些因素还没有得到充分的研究。本文提出了一个加权信任公式,并提出了一种集成的信任更新方法。首先比较几种推荐信任公式,分析影响信任更新的因素。我们提出利用异常信任值序列和统计分析来检测恶意推荐者和虚假推荐信任值。假设直接信任权值与推荐信任权值相互独立,提出了一种基于信任值序列的实时权重更新方法。仿真结果表明,该方法能够有效地检测出恶意推荐者和恶意推荐信任值,使信任值序列更加平滑。
{"title":"Reputation-based Trust Update in Network Environment","authors":"Shufen Peng, Jingsha He, Yao Meng","doi":"10.1109/ISECS.2008.211","DOIUrl":"https://doi.org/10.1109/ISECS.2008.211","url":null,"abstract":"In a network environment, trust management is an important security issue. A weighted sum is prevalent in trust formalization. Trust is contextual, continuous and changeful. There are many factors that can affect trust update in the whole lifetime of trust. However, these factors have not been studied thoroughly. In this paper, we propose a weighted trust formula and present an integrated trust update method. First, we will compare several recommendation trust formula and analyze the factors that affect trust update. We propose to use abnormal trust value sequence and statistical analysis to detect malicious recommenders and false recommendation trust values in the whole lifetime of trust. Assuming that direct trust weight and recommendation trust weight are independent from each other, we propose a real-time weight update method through trust value sequences. Simulation results show that our method could effectively detect malicious recommenders and malicious recommendation trust values and make trust value sequence smoother.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122025037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation 对于任意单向排列的任意NP,可忽略错误概率的5轮计算零知识证明
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.88
Chunming Tang, D. Pei, Z. Yao
We will construct a perfectly hiding commitment in two rounds from any one-way permutation, which is a negation of this result that O(n/(log n)) rounds is the tight lower bound on the rounds complexity of perfectly hiding commitments from any one-way permutation. Based on our commitments, we will construct a computational zero-knowledge proof for any NP that achieves negligible error probability in 5 rounds of interaction, assuming only the existence of a one-way permutation.
我们将从任意单向排列构造一个两轮完全隐藏承诺,这是O(n/(log n))轮是任意单向排列完全隐藏承诺的轮复杂度的紧下界这一结果的否定。基于我们的承诺,我们将为任何在5轮交互中实现可忽略不计的错误概率的NP构建一个计算零知识证明,假设只存在单向排列。
{"title":"5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation","authors":"Chunming Tang, D. Pei, Z. Yao","doi":"10.1109/ISECS.2008.88","DOIUrl":"https://doi.org/10.1109/ISECS.2008.88","url":null,"abstract":"We will construct a perfectly hiding commitment in two rounds from any one-way permutation, which is a negation of this result that O(n/(log n)) rounds is the tight lower bound on the rounds complexity of perfectly hiding commitments from any one-way permutation. Based on our commitments, we will construct a computational zero-knowledge proof for any NP that achieves negligible error probability in 5 rounds of interaction, assuming only the existence of a one-way permutation.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125110166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Executable Code Authorization Model for Secure Operating System 安全操作系统的可执行代码授权模型
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.43
Chen Ze-mao, Wu Xiaoping, Tang Weimin
Executable code not effectively inspected and authorized before its execution has been one of the key reasons for wild spread of malicious codes. This paper proposes a program file authorization model based on an integrity measurement and access control combined methodology. It measures integrity signature of each program file and verifies it with the its original value before its execution. By allowing only running of known and trusted programs, it is able to disable invokes of malicious programs. To protect from attacks which donpsilat modify a program file, an active code authorization scheme is proposed. It divides a program file into an ordered series of code blocks by the return and jump instructions, constructs the integrity signatures of all code blocks respectively at compiling time, then measures and verifies them at run-time. By disallowing unexpected code blocks from running, it is able to prevent invokes of malicious codes injected by attackers.
可执行代码在执行前没有得到有效的检查和授权是恶意代码肆意传播的重要原因之一。提出了一种基于完整性测量和访问控制相结合的程序文件授权模型。它测量每个程序文件的完整性签名,并在执行前用其原始值进行验证。通过只允许运行已知和受信任的程序,它能够禁用恶意程序的调用。为了防止不修改程序文件的攻击,提出了一种主动代码授权方案。它通过返回和跳转指令将程序文件划分为一系列有序的代码块,在编译时分别构造所有代码块的完整性签名,然后在运行时测量和验证它们。通过禁止运行意外的代码块,它能够防止调用攻击者注入的恶意代码。
{"title":"An Executable Code Authorization Model for Secure Operating System","authors":"Chen Ze-mao, Wu Xiaoping, Tang Weimin","doi":"10.1109/ISECS.2008.43","DOIUrl":"https://doi.org/10.1109/ISECS.2008.43","url":null,"abstract":"Executable code not effectively inspected and authorized before its execution has been one of the key reasons for wild spread of malicious codes. This paper proposes a program file authorization model based on an integrity measurement and access control combined methodology. It measures integrity signature of each program file and verifies it with the its original value before its execution. By allowing only running of known and trusted programs, it is able to disable invokes of malicious programs. To protect from attacks which donpsilat modify a program file, an active code authorization scheme is proposed. It divides a program file into an ordered series of code blocks by the return and jump instructions, constructs the integrity signatures of all code blocks respectively at compiling time, then measures and verifies them at run-time. By disallowing unexpected code blocks from running, it is able to prevent invokes of malicious codes injected by attackers.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125925510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on the Shift of Default Risk in Supply Chain Based on the Credit Default Swap 基于信用违约互换的供应链违约风险转移研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.189
Xianjun Qi, Hongping Yang
Taking the retailerpsilas default in supply chain for example, in this paper, using the theory of credit default swap, the writer intends to make a research on the shift of default risk in supply chain. On the condition of insured interest rate and recovery rate, a supposition is made that the default rate of supply chain depends on the doubly stochastic Poisson default process, and then a model of credit default swap is established, and a simple pricing model of standard credit default swap and long-term credit default swap are discussed.
本文以供应链中零售商违约为例,运用信用违约互换理论,对供应链中违约风险的转移进行研究。在保证利率和回收率的条件下,假设供应链的违约率依赖于双随机泊松违约过程,建立了信用违约互换模型,并讨论了标准信用违约互换和长期信用违约互换的简单定价模型。
{"title":"Research on the Shift of Default Risk in Supply Chain Based on the Credit Default Swap","authors":"Xianjun Qi, Hongping Yang","doi":"10.1109/ISECS.2008.189","DOIUrl":"https://doi.org/10.1109/ISECS.2008.189","url":null,"abstract":"Taking the retailerpsilas default in supply chain for example, in this paper, using the theory of credit default swap, the writer intends to make a research on the shift of default risk in supply chain. On the condition of insured interest rate and recovery rate, a supposition is made that the default rate of supply chain depends on the doubly stochastic Poisson default process, and then a model of credit default swap is established, and a simple pricing model of standard credit default swap and long-term credit default swap are discussed.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis of Knowledge Sharing Incentive Mechanism inside the Enterprise Based on Evolutionary Game 基于进化博弈的企业内部知识共享激励机制分析
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.167
Yang Liu
Based on the supposition that enterprise employees are rationality-bounded, this paper establishes an evolutionary game model of knowledge sharing inside enterprise. We can get the evolutionary stable point of the model by calculation. By the analysis of the position of the stable point, we can find out the key factors which should be focused upon during the design of knowledge sharing incentive mechanism inside the enterprise. We submit a major argument that an appropriate incentive mechanism with the proper focusing factors could make the knowledge sharing of an enterprise evolve toward a state which is satisfied by enterprise managers.
基于企业员工是理性有限的假设,建立了企业内部知识共享的演化博弈模型。通过计算得到模型的进化稳定点。通过对稳定点位置的分析,找出企业内部知识共享激励机制设计应关注的关键因素。本文的主要论点是,适当的激励机制和适当的聚焦因素可以使企业的知识共享向企业管理者满意的状态发展。
{"title":"An Analysis of Knowledge Sharing Incentive Mechanism inside the Enterprise Based on Evolutionary Game","authors":"Yang Liu","doi":"10.1109/ISECS.2008.167","DOIUrl":"https://doi.org/10.1109/ISECS.2008.167","url":null,"abstract":"Based on the supposition that enterprise employees are rationality-bounded, this paper establishes an evolutionary game model of knowledge sharing inside enterprise. We can get the evolutionary stable point of the model by calculation. By the analysis of the position of the stable point, we can find out the key factors which should be focused upon during the design of knowledge sharing incentive mechanism inside the enterprise. We submit a major argument that an appropriate incentive mechanism with the proper focusing factors could make the knowledge sharing of an enterprise evolve toward a state which is satisfied by enterprise managers.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129631798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Opponent's Negotiation Behavior Model to Facilitate Buyer-seller Negotiations in Supply Chain Management 促进供应链中买卖双方谈判的对手谈判行为模型
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.93
Fang Fang, Ye Xin, Xia Yun, Xun Haitao
Buyer-seller negotiation is an interactive process so that the outcome is not only determined by an agentpsilas own tactics but also influenced by his opponentpsilas choices. Therefore, retrieving the knowledge of the opponent to simulate the opponentpsilas possible actions can increase the payoffs. An ANN_based Opponentpsilas negotiation behavior model (OpNBM) is proposed. It consists of two basic negotiation behaviors: Bid_Evaluation simulates the negotiatorpsilas utility function, and Bid_Generation simulates the concession strategy. Furthermore, by observing the changes of the opponent during the actual bargaining process, the agent keeps adjusting the OpNBM with increase of the negotiation rounds. Several experiments have shown that the OpNBM can help agents to better prepare for the negotiation and achieve a better outcome.
买卖双方谈判是一个相互作用的过程,其结果不仅取决于代理人自身的策略,也受其对手选择的影响。因此,获取对手的知识来模拟对手可能的行动可以增加收益。提出了一种基于神经网络的对手协商行为模型(OpNBM)。它由两个基本的协商行为组成:Bid_Evaluation模拟谈判者的效用函数,Bid_Generation模拟让步策略。此外,通过观察实际议价过程中对手的变化,agent随着谈判回合的增加不断调整OpNBM。几个实验表明,OpNBM可以帮助代理更好地为谈判做准备,并获得更好的结果。
{"title":"An Opponent's Negotiation Behavior Model to Facilitate Buyer-seller Negotiations in Supply Chain Management","authors":"Fang Fang, Ye Xin, Xia Yun, Xun Haitao","doi":"10.1109/ISECS.2008.93","DOIUrl":"https://doi.org/10.1109/ISECS.2008.93","url":null,"abstract":"Buyer-seller negotiation is an interactive process so that the outcome is not only determined by an agentpsilas own tactics but also influenced by his opponentpsilas choices. Therefore, retrieving the knowledge of the opponent to simulate the opponentpsilas possible actions can increase the payoffs. An ANN_based Opponentpsilas negotiation behavior model (OpNBM) is proposed. It consists of two basic negotiation behaviors: Bid_Evaluation simulates the negotiatorpsilas utility function, and Bid_Generation simulates the concession strategy. Furthermore, by observing the changes of the opponent during the actual bargaining process, the agent keeps adjusting the OpNBM with increase of the negotiation rounds. Several experiments have shown that the OpNBM can help agents to better prepare for the negotiation and achieve a better outcome.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128984157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2008 International Symposium on Electronic Commerce and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1