We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
We present a new hybrid algorithm for local search in distributed combinatorial optimization. This method is a mix between classical local search methods in which nodes take decis...
This paper describes an intelligent agent to facilitate bitext mining from the Web via automatic discovery of URL pairing patterns (or keys) for retrieving parallel web pages. The...
I introduce a new approach to data representation, which reflects the mechanism of mind based on the compartmentalization of brain into two hemispheres. I cribe an abstract device...
This paper describes our efforts to investigate factors in user browsing behavior to automatically evaluate Web pages that the user shows interest in. We developed a client site l...
We apply our work on Web service discovery with initially incomplete information to the problem of service composition. Rich semantic descriptions of Goals and Web services allow ...
In this article we study the theoretical aspects of the collision avoidance among the collectives of unmanned aerial vehicles (UAVs) engaged in the free flight operation. The fre...
Existing models of virtual humans in urban settings have largely focused on algorithmic or graphical efficiency. They look realistic but are relatively lacking as experimental too...
In our model agent-based e-commerce system [2] we have assumed that a certain number of items of a given product is available for sale. In this note we introduce a model logistics...
Tomasz Serzysko, Maria Ganzha, Maciej Gawinecki, P...