It is known that no single descriptor is powerful enough to encompass all aspects of image content, i.e. each feature extraction method has its own view of the image content. A pos...
Lin Mei, Gerd Brunner, Lokesh Setia, Hans Burkhard...
Abstract. We present an analysis Trust Analysis Methodology for finding trust issues within pervasive computing systems. It is based on a systematic analysis of scenarios that des...
This paper exhaustively discusses and compares the performance differences between radial basis probabilistic neural networks (RBPNN) and radial basis function neural networks (RBF...
—This paper addresses the simulation of the dynamics of complex systems by using hierarchical graph and multi-agent system. A complex system is composed of numerous interacting p...
Agent-based social simulation (with multi-agent systems), which is an important aspect of social computing, can benefit from incorporating cognitive architectures, as they provid...