[1]王娟 柴玉梅.基于多议题协商的贝叶斯学习[J].计算机技术与发展,2006,(02):154-156.
 WANG Juan,CHAI Yu-mei.A Bayesian Learning Based on Multi- Issues Negotiation[J].,2006,(02):154-156.
点击复制

基于多议题协商的贝叶斯学习()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2006年02期
页码:
154-156
栏目:
智能、算法、系统工程
出版日期:
1900-01-01

文章信息/Info

Title:
A Bayesian Learning Based on Multi- Issues Negotiation
文章编号:
1005-3751(2006)02-0154-03
作者:
王娟 柴玉梅
郑州大学信息工程学院
Author(s):
WANG Juan CHAI Yu-mei
School of Information Engineering, Zhengzhou University
关键词:
agent协商贝叶斯在线学习多议题
Keywords:
agent negotiation Bayesian online learning multi- issues
分类号:
TP18
文献标志码:
A
摘要:
随着Internet的日益完善和电子商务的普及,如何快速、高效地进行agent协商学习是必须面对和解决的一个重要问题。文中从买方agent的观点出发,在协商过程中采用贝叶斯学习机制进行在线更新对方agent的信念,从而缩短了协商时间,提高了协商效率,并实验说明了其可行性
Abstract:
With the development of Intemet and the popularization of EC, how to solve the agent negotiation learning problem is an important problem. In this paper, stated the viewpoints from the respective of the buyer agent firstly. In negotiation process, used Bayesian learning to update initial belief of the opponent through the online learning. Sequentially could shorten negotiation time and advance negotiation efficiency. Moreover,testified the feasibility by experiment

相似文献/References:

[1]王军豪 彭岩.基于主观贝叶斯的点击流数据分析应用研究[J].计算机技术与发展,2008,(07):116.
 WANG Jun-hao,PENG Yan.Application and Research of Clickstream Data Analysis Based on Bayes[J].,2008,(02):116.
[2]高志森 张铮 李俊.入侵检测中贝叶斯分类器改进的研究[J].计算机技术与发展,2006,(11):154.
 GAO Zhi-sen,ZHANG Zheng,LI Jun.Improved Bayesian Classifier of Intrusion Detection[J].,2006,(02):154.
[3]江欢 汤进 郭玉堂 罗斌.基于t混合模型的自动图像标注[J].计算机技术与发展,2010,(10):86.
 JIANG Huan,TANG Jin,GUO Yu-tang,et al.Automatic Image Annotation Based on t Mixture Model[J].,2010,(02):86.
[4]曾永忠[] []张帅[] 马忠权[]. 一种基于用户会话的异常检测方法[J].计算机技术与发展,2014,24(07):141.
 ZENG Yong-zhong[][],ZHANG Shuai[] A Zhong-quan[]. An Anomaly Detection Method Based on Session[J].,2014,24(02):141.
[5]裴向杰,唐红昇,陈鹏. 一种改进的贝叶斯算法在短信过滤中的研究[J].计算机技术与发展,2015,25(09):89.
 PEI Xiang-jie,TANG Hong-sheng,CHEN Peng. Research on Optimized Naive Bayesian Algorithm in SMS Spam Filtering[J].,2015,25(02):89.
[6]刘思聪,郑日忠,张启坤,等.基于堆结构的域间访问控制模型[J].计算机技术与发展,2018,28(02):130.[doi:10.3969/j.issn.1673-629X.2018.02.028]
 LIU Sicong,ZHENG izhong,ZHANG Qikun,et al.Inter-domain Access Control Model Based on Heap Structure[J].,2018,28(02):130.[doi:10.3969/j.issn.1673-629X.2018.02.028]
[7]王有远[],张乐恩[]. 基于情境感知的设计资源服务需求获取研究[J].计算机技术与发展,2017,27(05):10.
 WANG You-yuan[],ZHANG Le-en[]. Investigation on Acquisition of Designing Resources ServiceRequirements with Context Awareness[J].,2017,27(02):10.
[8]马荟平,李 鹏,肖 航,等.基于贝叶斯攻击图的 RFID 系统安全评估模型[J].计算机技术与发展,2024,34(02):113.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 017]
 MA Hui-ping,LI Peng,XIAO Hang,et al.RFID System Security Evaluation Model Based on Bayesian Attack Graph[J].,2024,34(02):113.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 017]

备注/Memo

备注/Memo:
河南省自然科学基金资助项目(0211050110)王娟(1981-),女,河南人,硕士研究生,主要研究方向为分布式人工智能与数据挖掘; 柴玉梅,硕士生导师,副教授,主要研究方向为分布式人工智能与数据挖掘
更新日期/Last Update: 1900-01-01