We apply a constrained Hidden Markov Model architecture to the problem of simultaneous localization and surveying from sensor logs of mobile agents navigating in unknown environmen...
For software agents to become part of e-commerce they have to be flexible—to engage in negotiations of forms which are not known in advance, and mobile—to migrate to remote lo...
Costin Badica, Maria Ganzha, Marcin Paprzycki, Ama...
There is an increasing need for automated support for humans monitoring the activity of distributed teams of cooperating agents, both human and machine. We characterize the domain...
—This document briefly describes a framework supporting the definition and implementation of virtual environment inhabited by interacting situated agents defined according to the...
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...