While there is a broad theoretic foundation for creating computational players for two-player games, such as Chess, the multi-player domain is not as well explored. We make an att...
A constrained agent is limited in the actions that it can take at any given time, and a challenging problem is to design policies for such agents to do the best they can despite t...
of Abstract Argumentation Guido Boella1 , Joris Hulstijn2 , and Leendert van der Torre3 1 Universit´a di Torino 2 Vrije Universiteit, Amsterdam 3 CWI Amsterdam and Delft Universit...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...
This paper develops a model for precisely defining how an agent interacts with objects in its environment through the use of its capabilities. Capabilities are recursively defined ...
Abstract. The field of Software Product Lines (SPL) emphasizes building a family of software products from which concrete products can be derived rapidly. This helps to reduce time...
Since there is no method to verify the trustworthiness of shared files in P2P file sharing systems, malicious peers can spread untrustworthy files to the system. In order to pre...
Abstract. There are two main traditions in defining a semantics for agent communication languages, based either on mental attitudes or on social commitments. In this paper, we tran...
XML has emerged as a common standard for data exchange over the World Wide Web. One way to manage XML data is to use the power of relational databases for storing and q...
Amir Jahangard Rafsanjani, Seyed-Hassan Mirian-Hos...
This paper analyses the advantages and disadvantages of the K-means algorithm and the DENCLUE algorithm. In order to realise the automation of clustering analysis and eliminate hu...
Yu-Chen Song, Michael J. O'Grady, Gregory M. P. O'...