Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
This paper presents an agent-based model for decision making, which integrates personal biological and psychological aspects with rational utility-based reasoning. The model takes ...
Nowadays, some process information is represented by a process model. To understand process executed in many activities, process mining technologies are now extensively studied to...
Many researchers in the HRI and ECA domains try to build robots and agents that exhibit human-like behavior in real-world close encounter situations. One major requirement for comp...
Data mining refers to the process of revealing unknown and potentially useful information from a large database. Frequent itemsets mining is one of the foundational problems in dat...
In this paper, we propose to apply an NA-tree in the Chord system to encode spatial region data in the data key part used in the hash function to data search. That is, we combine t...
A computational agent model for monitoring and control of a virtual human agent’s resources and exhaustion is presented. It models a physically grounded intelligent decision maki...
Abstract Unipolar depression is a mental disorder characterized by a persistent low mood and loss of awareness or contentment in usual activities [1]. Despite the modern era of pha...