callback( { "result":{ "query":":facetid:toc:\"db/conf/prima/prima2017.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"65.87" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"37", "@dc":"37", "@oc":"37", "@id":"43420037", "text":":facetid:toc:db/conf/prima/prima2017.bht" } }, "hits":{ "@total":"37", "@computed":"37", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"3004759", "info":{"authors":{"author":[{"@pid":"16/5131","text":"Reyhan Aydogan"},{"@pid":"01/2796","text":"Pinar Öztürk"},{"@pid":"207/5236","text":"Yousef Razeghi"}]},"title":"Negotiation for Incentive Driven Privacy-Preserving Information Sharing.","venue":"PRIMA","pages":"486-494","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/AydoganOR17","doi":"10.1007/978-3-319-69131-2_31","ee":"https://doi.org/10.1007/978-3-319-69131-2_31","url":"https://dblp.org/rec/conf/prima/AydoganOR17"}, "url":"URL#3004759" }, { "@score":"1", "@id":"3004761", "info":{"authors":{"author":[{"@pid":"b/MatteoBaldoni","text":"Matteo Baldoni"},{"@pid":"b/CristinaBaroglio","text":"Cristina Baroglio"},{"@pid":"196/0853","text":"Katherine M. May"},{"@pid":"79/3512","text":"Roberto Micalizio"},{"@pid":"196/0851","text":"Stefano Tedeschi 0001"}]},"title":"ADOPT JaCaMo: Accountability-Driven Organization Programming Technique for JaCaMo.","venue":"PRIMA","pages":"295-312","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/BaldoniBMMT17","doi":"10.1007/978-3-319-69131-2_18","ee":"https://doi.org/10.1007/978-3-319-69131-2_18","url":"https://dblp.org/rec/conf/prima/BaldoniBMMT17"}, "url":"URL#3004761" }, { "@score":"1", "@id":"3004762", "info":{"authors":{"author":[{"@pid":"207/5243","text":"Ziyi Bao"},{"@pid":"173/8289","text":"Kristijonas Cyras"},{"@pid":"t/FrancescaToni","text":"Francesca Toni"}]},"title":"ABAplus: Attack Reversal in Abstract and Structured Argumentation with Preferences.","venue":"PRIMA","pages":"420-437","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/BaoCT17","doi":"10.1007/978-3-319-69131-2_25","ee":"https://doi.org/10.1007/978-3-319-69131-2_25","url":"https://dblp.org/rec/conf/prima/BaoCT17"}, "url":"URL#3004762" }, { "@score":"1", "@id":"3004763", "info":{"authors":{"author":[{"@pid":"b/ChittaBaral","text":"Chitta Baral"},{"@pid":"s/TranCaoSon","text":"Tran Cao Son"}]},"title":"Revision and Updates in Possibly Action-Occurrence-Incomplete Narratives.","venue":"PRIMA","pages":"53-70","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/BaralS17","doi":"10.1007/978-3-319-69131-2_4","ee":"https://doi.org/10.1007/978-3-319-69131-2_4","url":"https://dblp.org/rec/conf/prima/BaralS17"}, "url":"URL#3004763" }, { "@score":"1", "@id":"3004764", "info":{"authors":{"author":[{"@pid":"22/3826","text":"Pietro Baroni"},{"@pid":"207/5179","text":"Giulia Comini"},{"@pid":"140/7707","text":"Antonio Rago 0001"},{"@pid":"t/FrancescaToni","text":"Francesca Toni"}]},"title":"Abstract Games of Argumentation Strategy and Game-Theoretical Argument Strength.","venue":"PRIMA","pages":"403-419","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/BaroniCRT17","doi":"10.1007/978-3-319-69131-2_24","ee":"https://doi.org/10.1007/978-3-319-69131-2_24","url":"https://dblp.org/rec/conf/prima/BaroniCRT17"}, "url":"URL#3004764" }, { "@score":"1", "@id":"3004766", "info":{"authors":{"author":[{"@pid":"259/6159","text":"Mohamed Tahar Bennai"},{"@pid":"78/2701","text":"Zahia Guessoum"},{"@pid":"11/912","text":"Smaine Mazouzi"},{"@pid":"65/6829","text":"Stéphane Cormier"},{"@pid":"60/752","text":"Mohamed Mezghiche"}]},"title":"Towards a Generic Multi-agent Approach for Medical Image Segmentation.","venue":"PRIMA","pages":"198-211","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/BennaiGMCM17","doi":"10.1007/978-3-319-69131-2_12","ee":"https://doi.org/10.1007/978-3-319-69131-2_12","url":"https://dblp.org/rec/conf/prima/BennaiGMCM17"}, "url":"URL#3004766" }, { "@score":"1", "@id":"3004767", "info":{"authors":{"author":[{"@pid":"135/0912","text":"Maiquel de Brito"},{"@pid":"h/JomiFredHubner","text":"Jomi Fred Hübner"},{"@pid":"44/5374","text":"Olivier Boissier"}]},"title":"Architecture of an Institutional Platform for Multi-Agent Systems.","venue":"PRIMA","pages":"313-329","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/BritoHB17","doi":"10.1007/978-3-319-69131-2_19","ee":"https://doi.org/10.1007/978-3-319-69131-2_19","url":"https://dblp.org/rec/conf/prima/BritoHB17"}, "url":"URL#3004767" }, { "@score":"1", "@id":"3004768", "info":{"authors":{"author":[{"@pid":"116/9311","text":"Maximiliano Celmo David Budán"},{"@pid":"91/1999","text":"Maria Laura Cobo"},{"@pid":"83/2092","text":"Diego C. Martínez"},{"@pid":"s/GuillermoRicardoSimari","text":"Guillermo Ricardo Simari"}]},"title":"An Approach to Characterize Topic-Centered Argumentation.","venue":"PRIMA","pages":"459-467","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/BudanCMS17","doi":"10.1007/978-3-319-69131-2_28","ee":"https://doi.org/10.1007/978-3-319-69131-2_28","url":"https://dblp.org/rec/conf/prima/BudanCMS17"}, "url":"URL#3004768" }, { "@score":"1", "@id":"3004769", "info":{"authors":{"author":[{"@pid":"c/FlorenceCloppet","text":"Florence Cloppet"},{"@pid":"74/6150","text":"Pavlos Moraitis"},{"@pid":"01/4341","text":"Nicole Vincent"}]},"title":"An Agent-Based System for Printed/Handwritten Text Discrimination.","venue":"PRIMA","pages":"180-197","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/CloppetMV17","doi":"10.1007/978-3-319-69131-2_11","ee":"https://doi.org/10.1007/978-3-319-69131-2_11","url":"https://dblp.org/rec/conf/prima/CloppetMV17"}, "url":"URL#3004769" }, { "@score":"1", "@id":"3004770", "info":{"authors":{"author":[{"@pid":"173/8289","text":"Kristijonas Cyras"},{"@pid":"125/4725-1","text":"Claudia Schulz 0001"},{"@pid":"t/FrancescaToni","text":"Francesca Toni"}]},"title":"Capturing Bipolar Argumentation in Non-flat Assumption-Based Argumentation.","venue":"PRIMA","pages":"386-402","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/Cyras0T17","doi":"10.1007/978-3-319-69131-2_23","ee":"https://doi.org/10.1007/978-3-319-69131-2_23","url":"https://dblp.org/rec/conf/prima/Cyras0T17"}, "url":"URL#3004770" }, { "@score":"1", "@id":"3004771", "info":{"authors":{"author":[{"@pid":"d/MehdiDastani","text":"Mehdi Dastani"},{"@pid":"43/6250","text":"Emiliano Lorini"},{"@pid":"m/JJCMeyer","text":"John-Jules Ch. Meyer"},{"@pid":"162/9570","text":"Alexander Pankov"}]},"title":"Other-Condemning Anger = Blaming Accountable Agents for Unattainable Desires.","venue":"PRIMA","pages":"15-33","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/DastaniLMP17","doi":"10.1007/978-3-319-69131-2_2","ee":"https://doi.org/10.1007/978-3-319-69131-2_2","url":"https://dblp.org/rec/conf/prima/DastaniLMP17"}, "url":"URL#3004771" }, { "@score":"1", "@id":"3004772", "info":{"authors":{"author":[{"@pid":"d/MehdiDastani","text":"Mehdi Dastani"},{"@pid":"09/129","text":"Sebastian Sardiña"},{"@pid":"182/9888","text":"Vahid Yazdanpanah"}]},"title":"Norm Enforcement as Supervisory Control.","venue":"PRIMA","pages":"330-348","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/DastaniSY17","doi":"10.1007/978-3-319-69131-2_20","ee":"https://doi.org/10.1007/978-3-319-69131-2_20","url":"https://dblp.org/rec/conf/prima/DastaniSY17"}, "url":"URL#3004772" }, { "@score":"1", "@id":"3004773", "info":{"authors":{"author":[{"@pid":"253/5952","text":"Carlos Díez"},{"@pid":"81/8103","text":"Víctor Sánchez-Anguix"},{"@pid":"45/3882","text":"Javier Palanca"},{"@pid":"80/1703","text":"Vicente Julián"},{"@pid":"45/4424","text":"Adriana Giret"}]},"title":"A Multi-agent Proposal for Efficient Bike-Sharing Usage.","venue":"PRIMA","pages":"468-476","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/DiezSPJG17","doi":"10.1007/978-3-319-69131-2_29","ee":"https://doi.org/10.1007/978-3-319-69131-2_29","url":"https://dblp.org/rec/conf/prima/DiezSPJG17"}, "url":"URL#3004773" }, { "@score":"1", "@id":"3004774", "info":{"authors":{"author":[{"@pid":"v/HansPvanDitmarsch","text":"Hans van Ditmarsch"},{"@pid":"165/8467","text":"Ioannis Kokkinis"},{"@pid":"207/5273","text":"Anders Stockmarr"}]},"title":"Reachability and Expectation in Gossiping.","venue":"PRIMA","pages":"93-109","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/DitmarschKS17","doi":"10.1007/978-3-319-69131-2_6","ee":"https://doi.org/10.1007/978-3-319-69131-2_6","url":"https://dblp.org/rec/conf/prima/DitmarschKS17"}, "url":"URL#3004774" }, { "@score":"1", "@id":"3004776", "info":{"authors":{"author":{"@pid":"85/192","text":"Jérôme Euzenat"}},"title":"Crafting Ontology Alignments from Scratch Through Agent Communication.","venue":"PRIMA","pages":"245-262","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/Euzenat17","doi":"10.1007/978-3-319-69131-2_15","ee":"https://doi.org/10.1007/978-3-319-69131-2_15","url":"https://dblp.org/rec/conf/prima/Euzenat17"}, "url":"URL#3004776" }, { "@score":"1", "@id":"3004777", "info":{"authors":{"author":[{"@pid":"98/2430","text":"Humbert Fiorino"},{"@pid":"82/6517","text":"Damien Pellier"}]},"title":"A Theory to Devise Dependable Cooperative Encounters.","venue":"PRIMA","pages":"504-513","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/FiorinoP17","doi":"10.1007/978-3-319-69131-2_33","ee":"https://doi.org/10.1007/978-3-319-69131-2_33","url":"https://dblp.org/rec/conf/prima/FiorinoP17"}, "url":"URL#3004777" }, { "@score":"1", "@id":"3004778", "info":{"authors":{"author":{"@pid":"77/1121","text":"Massimiliano Giacomin"}},"title":"Handling Heterogeneous Disagreements Through Abstract Argumentation (Extended Abstract).","venue":"PRIMA","pages":"3-11","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/Giacomin17","doi":"10.1007/978-3-319-69131-2_1","ee":"https://doi.org/10.1007/978-3-319-69131-2_1","url":"https://dblp.org/rec/conf/prima/Giacomin17"}, "url":"URL#3004778" }, { "@score":"1", "@id":"3004779", "info":{"authors":{"author":[{"@pid":"180/1378","text":"Taha D. Günes"},{"@pid":"207/5240","text":"Emir Arditi"},{"@pid":"16/5131","text":"Reyhan Aydogan"}]},"title":"Collective Voice of Experts in Multilateral Negotiation.","venue":"PRIMA","pages":"450-458","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/GunesAA17","doi":"10.1007/978-3-319-69131-2_27","ee":"https://doi.org/10.1007/978-3-319-69131-2_27","url":"https://dblp.org/rec/conf/prima/GunesAA17"}, "url":"URL#3004779" }, { "@score":"1", "@id":"3004780", "info":{"authors":{"author":[{"@pid":"62/5599","text":"Mingyu Guo"},{"@pid":"57/4288","text":"Hideaki Hata"},{"@pid":"03/1909","text":"Muhammad Ali Babar 0001"}]},"title":"Optimizing Affine Maximizer Auctions via Linear Programming: An Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets.","venue":"PRIMA","pages":"280-292","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/GuoHB17","doi":"10.1007/978-3-319-69131-2_17","ee":"https://doi.org/10.1007/978-3-319-69131-2_17","url":"https://dblp.org/rec/conf/prima/GuoHB17"}, "url":"URL#3004780" }, { "@score":"1", "@id":"3004781", "info":{"authors":{"author":[{"@pid":"62/5599","text":"Mingyu Guo"},{"@pid":"74/3247-1","text":"Hong Shen 0001"}]},"title":"Speed up Automated Mechanism Design by Sampling Worst-Case Profiles: An Application to Competitive VCG Redistribution Mechanism for Public Project Problem.","venue":"PRIMA","pages":"127-142","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/GuoS17","doi":"10.1007/978-3-319-69131-2_8","ee":"https://doi.org/10.1007/978-3-319-69131-2_8","url":"https://dblp.org/rec/conf/prima/GuoS17"}, "url":"URL#3004781" }, { "@score":"1", "@id":"3004782", "info":{"authors":{"author":[{"@pid":"207/5188","text":"Fatma R. Habib"},{"@pid":"17/1211","text":"Maria Polukarov"},{"@pid":"g/EnricoGerding","text":"Enrico H. Gerding"}]},"title":"Optimising Social Welfare in Multi-Resource Threshold Task Games.","venue":"PRIMA","pages":"110-126","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/HabibPG17","doi":"10.1007/978-3-319-69131-2_7","ee":"https://doi.org/10.1007/978-3-319-69131-2_7","url":"https://dblp.org/rec/conf/prima/HabibPG17"}, "url":"URL#3004782" }, { "@score":"1", "@id":"3004784", "info":{"authors":{"author":[{"@pid":"78/5206-1","text":"Hiroyuki Kido 0001"},{"@pid":"77/6000","text":"Frank Zenker"}]},"title":"Argument-Based Bayesian Estimation of Attack Graphs: A Preliminary Empirical Analysis.","venue":"PRIMA","pages":"523-532","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/KidoZ17","doi":"10.1007/978-3-319-69131-2_35","ee":"https://doi.org/10.1007/978-3-319-69131-2_35","url":"https://dblp.org/rec/conf/prima/KidoZ17"}, "url":"URL#3004784" }, { "@score":"1", "@id":"3004786", "info":{"authors":{"author":[{"@pid":"19/5949","text":"Fenrong Liu"},{"@pid":"43/6250","text":"Emiliano Lorini"}]},"title":"Reasoning About Belief, Evidence and Trust in a Multi-agent Setting.","venue":"PRIMA","pages":"71-89","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/LiuL17","doi":"10.1007/978-3-319-69131-2_5","ee":"https://doi.org/10.1007/978-3-319-69131-2_5","url":"https://dblp.org/rec/conf/prima/LiuL17"}, "url":"URL#3004786" }, { "@score":"1", "@id":"3004787", "info":{"authors":{"author":[{"@pid":"13/7269","text":"Marin Lujak"},{"@pid":"30/2434","text":"Holger Billhardt"}]},"title":"A Distributed Algorithm for Dynamic Break Scheduling in Emergency Service Fleets.","venue":"PRIMA","pages":"477-485","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/LujakB17","doi":"10.1007/978-3-319-69131-2_30","ee":"https://doi.org/10.1007/978-3-319-69131-2_30","url":"https://dblp.org/rec/conf/prima/LujakB17"}, "url":"URL#3004787" }, { "@score":"1", "@id":"3004788", "info":{"authors":{"author":[{"@pid":"207/5177","text":"Tomohiro Ono"},{"@pid":"67/7117","text":"Taiki Todo"},{"@pid":"32/2416","text":"Makoto Yokoo"}]},"title":"Rename and False-Name Manipulations in Discrete Facility Location with Optional Preferences.","venue":"PRIMA","pages":"163-179","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/OnoTY17","doi":"10.1007/978-3-319-69131-2_10","ee":"https://doi.org/10.1007/978-3-319-69131-2_10","url":"https://dblp.org/rec/conf/prima/OnoTY17"}, "url":"URL#3004788" }, { "@score":"1", "@id":"3004790", "info":{"authors":{"author":[{"@pid":"61/11268","text":"Truls Pedersen"},{"@pid":"40/2794","text":"Marija Slavkovik 0001"}]},"title":"Formal Models of Conflicting Social Influence.","venue":"PRIMA","pages":"349-365","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/PedersenS17","doi":"10.1007/978-3-319-69131-2_21","ee":"https://doi.org/10.1007/978-3-319-69131-2_21","url":"https://dblp.org/rec/conf/prima/PedersenS17"}, "url":"URL#3004790" }, { "@score":"1", "@id":"3004791", "info":{"authors":{"author":[{"@pid":"33/8219","text":"Daniele Porello"},{"@pid":"66/2057","text":"Nicolas Troquard"},{"@pid":"08/6731-1","text":"Roberto Confalonieri 0001"},{"@pid":"08/8883","text":"Pietro Galliani"},{"@pid":"38/2192","text":"Oliver Kutz"},{"@pid":"56/3960","text":"Rafael Peñaloza"}]},"title":"Repairing Socially Aggregated Ontologies Using Axiom Weakening.","venue":"PRIMA","pages":"441-449","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/PorelloT0GKP17","doi":"10.1007/978-3-319-69131-2_26","ee":"https://doi.org/10.1007/978-3-319-69131-2_26","url":"https://dblp.org/rec/conf/prima/PorelloT0GKP17"}, "url":"URL#3004791" }, { "@score":"1", "@id":"3004792", "info":{"authors":{"author":[{"@pid":"207/5242","text":"Fredrik Präntare"},{"@pid":"18/3935","text":"Ingemar Ragnemalm"},{"@pid":"86/6319","text":"Fredrik Heintz"}]},"title":"An Algorithm for Simultaneous Coalition Structure Generation and Task Assignment.","venue":"PRIMA","pages":"514-522","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/PrantareRH17","doi":"10.1007/978-3-319-69131-2_34","ee":"https://doi.org/10.1007/978-3-319-69131-2_34","url":"https://dblp.org/rec/conf/prima/PrantareRH17"}, "url":"URL#3004792" }, { "@score":"1", "@id":"3004793", "info":{"authors":{"author":[{"@pid":"162/5032","text":"Masoume M. Raeissi"},{"@pid":"65/9255","text":"Nathan Brooks"},{"@pid":"f/AlessandroFarinelli","text":"Alessandro Farinelli"}]},"title":"A Balking Queue Approach for Modeling Human-Multi-Robot Interaction for Water Monitoring.","venue":"PRIMA","pages":"212-223","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/RaeissiBF17","doi":"10.1007/978-3-319-69131-2_13","ee":"https://doi.org/10.1007/978-3-319-69131-2_13","url":"https://dblp.org/rec/conf/prima/RaeissiBF17"}, "url":"URL#3004793" }, { "@score":"1", "@id":"3004794", "info":{"authors":{"author":[{"@pid":"140/7707","text":"Antonio Rago 0001"},{"@pid":"t/FrancescaToni","text":"Francesca Toni"}]},"title":"Quantitative Argumentation Debates with Votes for Opinion Polling.","venue":"PRIMA","pages":"369-385","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/prima/RagoT17","doi":"10.1007/978-3-319-69131-2_22","ee":"https://doi.org/10.1007/978-3-319-69131-2_22","url":"https://dblp.org/rec/conf/prima/RagoT17"}, "url":"URL#3004794" } ] } } } )