In this paper we propose a novel method for automatic evaluation of conversational agents. The method is based on analyzing the user’s affect conveyed in utterances. From analyz...
Michal Ptaszynski, Pawel Dybala, Shinsuke Higuchi,...
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
This paper studies the problem of statically determining upper bounds on the resource consumption of first-order functional programs. A previous work approached the problem with an...
This article aims to provide foundations for a new approach to Agent Communication Languages (ACLs). First, we present the theory of signalling acts. In contrast to current approa...
In order to create adaptive Agent Systems with abilities matching those of their biological counterparts, a natural approach is to incorporate classical conditioning mechanisms int...
Tibor Bosse, Catholijn M. Jonker, Sander A. Los, L...