Accessing up-to-date information in a fast and easy way implies the necessity of information management tools to explore and analyse the huge number of available electronic resourc...
Generally, swarm models and algorithms consider synchronous agents, i.e., they act simultaneously. This hypothesis does not fit multi-agent simulators nor robotic systems. In this...
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
In this article we describe a computational architecture called MC2 that brings together a set of tools that contribute to the knowledge management process by allowing for the cre...
The widespread use of computers and of the internet have brought about human information overload, particularly in the areas of internet searches and email management. This has ma...