Guest Editorial: Agent and System Transparency
نویسندگان
چکیده
منابع مشابه
Guest Editorial Spatial agent-based modelling
The convergence of object-oriented approaches to data modelling within geographic information science together with increasingly fine-scale data collection approaches and discrete-event simulations has created new opportunities to build dynamic representations of geographical systems (Gimblett 2002, Brown et al. 2005). In particular, agent-based modelling has become an important representationa...
متن کاملGUEST EDITORIAL System architecture design
All throughout history people have had the sense that products become more complex by incorporating new features or new technologies. Up to the middle of the 20th century, most products remained sufficiently simple that single people could design them. Now, all but the simplest products are designed by teams of people with different skills and expertise. Modern products span a range of traditio...
متن کاملGuest Editorial: Agent-based Modelling of Evolutionary Economic Systems
A modern market-based economy is an example of a complex adaptive system, consisting of a decentralized collection of autonomous agents interacting in various market contexts. These massively parallel local interactions give rise to global regularities such as trade networks, socially accepted monies, market protocols, business cycles and the common adoption of technological innovations. The re...
متن کاملGuest editorial agent-based modeling of evolutionary economic systems
A MODERN market-based economy is an example of a complex adaptive system, consisting of a decentralized collection of autonomous agents interacting in various market contexts. These massively parallel local interactions give rise to global regularities such as trade networks, socially accepted monies, market protocols, business cycles, and the common adoption of technological innovations. The r...
متن کاملGuest Editorial: Emerging Software Reliability and System Security Technologies
Due to the quick development of mobile, ubiquitous, cloud, network and communication systems and applications, many computer and communication systems, wired or wireless, have been proposed to provide their users (human or other systems) with different services. However, hackers may anytime and anywhere attack these systems for stealing a company’s business secrets or a person’s credit card inf...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Human-Machine Systems
سال: 2020
ISSN: 2168-2291,2168-2305
DOI: 10.1109/thms.2020.2988835