In real world applications, agents - be they software agents or autonomous robots - inevitably face erroneous situations that have not been planned for. Re-planning can sometimes ...
Robert J. Ross, Rem W. Collier, Gregory M. P. O'Ha...
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
the right abstractions is important for managing the complexity of your system. Three t abstractions used today are object, component and agent. Many similarities exist these abst...
Dwight Deugo, Franz Oppacher, Bruce Ashfield, Mich...
Various researches have proved that cultural differences affect the process and results of user research, emphasizing that should cultural attention be given in order to obtain suf...
Condensed representations of pattern collections have been recognized to be important building blocks of inductive databases, a promising theoretical framework for data mining, and...