This paper discusses the implementation of optimizaiion based DSSs. A n approach is proposed that will enable OR/MS analysts to develop this kind of system much more eociently tha...
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...
Abstract. This paper presents J-MADeM, a new market-based multi-agent approach devoted to perform social simulations with BDI agents. J-MADeM is available as an open-source library...
Francisco Grimaldo, Miguel Lozano, Fernando Barber
This paper presents a real-time vision-based system to assist a person with dementia wash their hands. The system uses only video inputs, and assistance is given as either verbal ...
Jesse Hoey, Pascal Poupart, Axel von Bertoldi, Tam...
In many situations, a set of hard constraints encodes the feasible configurations of some system or product over which multiple users have distinct preferences. However, making su...