This paper briefly outlines the main characteristics of an ongoing research aimed at developing a support library for implementing systems based on autonomous agents. The library ...
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
Distributed Internet-based attacks on computer systems are becoming more prevalent. These attacks usually employ some form of automation and involve the compromise of many systems...
The evolution of music, from random note strings to certain “pleasant” note sequences, is traced in a multi-agent computational model. A community of agents, with some musical ...
Avari is a virtual receptionist for the Computer Science department at The University of North Carolina at Charlotte. Her components include background subtraction to detect a per...