Skip to Main Content
Iris Biometric Model for Secured Network Access
book

Iris Biometric Model for Secured Network Access

by Franjieh El Khoury
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
5h 23m
English
CRC Press
Content preview from Iris Biometric Model for Secured Network Access
61
muLtIagent system
1. e language of negotiation, its semantics, and its use in all
protocols
2. Negotiation decisions that are interested in algorithms to
compare the subjects of negotiation, the utility functions, and
the characterization of agents’ preferences
3. e negotiation process that studies general models of
negotiation
Several protocols have been adopted for negotiation between agents
to solve problems of conflict. Among these protocols we can mention
the protocol of the network “contract-net” and the protocol of the
cooperation strategy:
e protocol of the network contract-net is the most used in
multiagent systems (Smith and Davis 1980). Agents coordi-
nate their activities through the establishment of contracts
to achieve ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti

Publisher Resources

ISBN: 9781466502147