From interaction to information Sample Clauses

From interaction to information. Once Xx,t has been chosen the active agent engages in an information gathering interaction (IGI) with each agent in Ii,t. An IGI is an abstraction for a process between two agents that results in an increase in information for at least one of the agents. An IGI is used to represent many things, such as message passing in distributed systems, or disease propagation in contagion models. The important facet of an interaction is that the agents have some information about each others state after the interaction. Consider the distributed commit problem from [Xxxxx, 1997]. Each agent sends messages to other agents in the system. Each message can be considered an IGI between the two agents, as it increases the information of one agent. In particular, one of the agents now has single agent state information about the other senders state. In the linguistic agreement case a language game is a type of IGI. As agents interact they receive information about the language of the other agent. IGIs can be organized around two properties, their accuracy and their effort. Accuracy of IGIs An IGI can result in inaccurate information. For instance, following the distributed commit problem example, if the sender agent exhibited Byzantine behavior – that is, unpredictable behavior – then the message that 3So technically, in this case time (as in number of instances of the GAP process) to convergence scales with N 2. Our work views time as the number of instances of this process before convergence. is sent might not actually represent the state of the sender. The following are some types of inaccuracies that can occur with IGIs. Byzantine Agents The agents taking part in an IGI might be unpredictable, due to perhaps malicious intent, or they might just be faulty in some sense. Interaction Failure The interaction might not take place, or if it does take place, result in no information. For instance, we can consider sending packets between machines via the UDP as an IGI – since UDP does not guarantee delivery an IGI might fail because a packet might get lost on the way. In contrast, if the IGI involved a TCP/IP session packets can (and do) get lost; however TCP/IP has a method to handle this with sequence numbers and packet acknowledgement. Erroneous Information During the IGI process information might be modified. Perhaps the transmission medium (for instance, phone lines, or wireless signal) was influenced by some other source. Partial Information The IGI might provide only parti...
AutoNDA by SimpleDocs

Related to From interaction to information

  • Access to Information Such Purchaser acknowledges that it has had the opportunity to review the Transaction Documents (including all exhibits and schedules thereto) and the SEC Reports and has been afforded, (i) the opportunity to ask such questions as it has deemed necessary of, and to receive answers from, representatives of the Company concerning the terms and conditions of the offering of the Securities and the merits and risks of investing in the Securities; (ii) access to information about the Company and its financial condition, results of operations, business, properties, management and prospects sufficient to enable it to evaluate its investment; and (iii) the opportunity to obtain such additional information that the Company possesses or can acquire without unreasonable effort or expense that is necessary to make an informed investment decision with respect to the investment. Such Purchaser acknowledges and agrees that neither the Placement Agent nor any Affiliate of the Placement Agent has provided such Purchaser with any information or advice with respect to the Securities nor is such information or advice necessary or desired. Neither the Placement Agent nor any Affiliate has made or makes any representation as to the Company or the quality of the Securities and the Placement Agent and any Affiliate may have acquired non-public information with respect to the Company which such Purchaser agrees need not be provided to it. In connection with the issuance of the Securities to such Purchaser, neither the Placement Agent nor any of its Affiliates has acted as a financial advisor or fiduciary to such Purchaser.

  • Power Supply Information and Access to Information 12 POWER SUPPLY INFORMATION

  • RELEASE OF GENERAL INFORMATION TO THE PUBLIC AND MEDIA NASA or Partner may, consistent with Federal law and this Agreement, release general information regarding its own participation in this Agreement as desired. Pursuant to Section 841(d) of the NASA Transition Authorization Act of 2017, Public Law 115-10 (the "NTAA"), NASA is obligated to publicly disclose copies of all agreements conducted pursuant to NASA's 51 U.S.C. §20113(e) authority in a searchable format on the NASA website within 60 days after the agreement is signed by the Parties. The Parties acknowledge that a copy of this Agreement will be disclosed, without redactions, in accordance with the NTAA.

  • Information to the Union 16-5.1 The Board shall make available to the Union upon request and with reasonable time to respond any reasonable information, statistics, and records which are relevant to negotiations, grievances, or necessary for the proper and legitimate enforcement of the terms of this Agreement. A copy of the annual Audit and Budget shall be sent to the Union President when available.

  • Control and Access to Information The Financial Mechanism Committee, the EFTA Board of Auditors and their representatives have the right to carry out any technical or financial mission or review they consider necessary to follow the planning, implementation and monitoring of programmes and projects as well as the use of funds. The Beneficiary State shall provide all necessary assistance, information and documentation.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Patient Information Each Party agrees to abide by all laws, rules, regulations, and orders of all applicable supranational, national, federal, state, provincial, and local governmental entities concerning the confidentiality or protection of patient identifiable information and/or patients’ protected health information, as defined by any other applicable legislation in the course of their performance under this Agreement.

  • Right to Information The City of Xxxxxx reserves the right to use any and all information presented in any response to this contract, whether amended or not, except as prohibited by law. Selection of rejection of the submittal does not affect this right.

  • Access to Information; Confidentiality (a) Upon reasonable advance written notice, subject to applicable logistical restrictions or limitations as a result of COVID-19 or any COVID-19 Measures and solely for purposes of furthering the Merger Transactions, the Company shall, and shall cause each of its Subsidiaries to, afford to Parent, Merger Sub and their respective representatives reasonable access during normal business hours during the period from the date of this Agreement until the earlier of the Effective Time or the valid termination of this Agreement pursuant to Article VII, to all their respective properties, assets, books, contracts, commitments, personnel and records and, during such period, the Company shall, and shall cause each of its Subsidiaries to, furnish promptly to Parent: (i) a copy of each report, schedule, registration statement and other document filed or received by it during such period pursuant to the requirements of federal or state securities Laws and (ii) all other information concerning its business, properties and personnel as Parent or Merger Sub may reasonably request (including Tax Returns filed and those in preparation and the workpapers of its auditors). Nothing herein (including, for the avoidance of doubt, this Section 5.2(a) and Section 5.2(b)) shall require the Company or any of its Subsidiaries to provide such access or information to the extent that such action (A) would reasonably be expected to result in a waiver of attorney-client privilege, work product doctrine or similar privilege, (B) specifically relates to the evaluation, deliberation or minutes of the Company Board (or any committee or subcommittee thereof) related to the Merger Transactions, the strategic and financial alternatives process leading thereto, or any information or materials provided to the Company Board (or any committee or subcommittee thereof) in connection therewith or (C) would reasonably be expected to violate any applicable Law or any confidentiality obligation owing to a third party so long as the Company shall promptly notify Parent of any such confidentiality obligations or access restrictions and use commercially reasonable efforts to obtain the consent of such third party to provide such information and otherwise provide such access to Parent, if requested and (b) generally describe the type of information that cannot be disclosed to Parent (to the extent not prohibited by law or the underlying document). No investigation pursuant to this Section 5.2 shall affect any representation or warranty in this Agreement of any party hereto or any condition to the obligations of the parties hereto. All requests for access pursuant to this Section 5.2 must be directed to the Chief Financial Officer of the Company or another person designated in writing by the Company. Notwithstanding anything herein to the contrary, Parent and Merger Sub shall not, and shall cause their respective representatives not to, contact any partner, licensor, licensee, customer or supplier of the Company in connection with the Offer, the Merger or any of the other Merger Transactions without the Company’s prior written consent (such consent not to be unreasonably withheld, conditioned or delayed), and Parent and Merger Sub acknowledge and agree that any such contact shall be arranged by and with a representative of the Company participating.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

Time is Money Join Law Insider Premium to draft better contracts faster.