1 Reinforcement learning has become a widely used methodology for creating intelligent agents in a wide range of applications. However, its performance deteriorates in tasks with s...
There is currently an ongoing demand for richer Intelligent Virtual Environments (IVEs) populated with social intelligent agents. As a result, many agent architectures are taking ...
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
The recent emergence of location-based social networking services is revolutionizing web-based social networking allowing users to share real-life experiences via geo-tagged user-...