Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Abstract. In this paper game scenarios that aim to establish elements of cooperative play such as imitation and turn taking between children with autism and a caregiver are investi...
In this paper we present a detailed analysis of the performance of the Decision Theoretic Read Delay (DTRD) optimistic synchronisation algorithm for simulations of Multistems. We ...
Michael Lees, Brian Logan, Dan Chen, Ton Oguara, G...
Many real-world tasks can be decomposed into pipelines of sequential operations (where subtasks may themselves be composed of one or more pipelines). JGram is a framework enabling...
Rahul Sukthankar, Antoine Brusseau, Ray Pelletier,...
Abstract. The student modeling (SM) is a core component in the development of Intelligent Learning Environments (ILEs). In this paper we describe how a Multi-agent Intelligent Lear...