Bayesian Agencies on the Internet
نویسنده
چکیده
Agencies consisting of simple agents can be deployed on the Internet to solve problems that are too complex for single autonomous Internet agents. We deploy Bayesian agencies on the Internet to achieve emergent belief propagation through the collective behavior of simple agents organized into heterarchies of agencies. Collectively the agents use probabilistic reasoning to deal with the uncertainty and non-determinism that they will encounter on the Internet. The simplicity of the agents as well as the minimal interaction between them allows us to use a commercially available application framework, namely Enterprise JavaBeans, to develop and deploy our Bayesian agencies on the Internet.
منابع مشابه
Bayesian Modeling Based on Data from the Internet of Things
The Internet of Things is suggested as the upcoming revolution in the Information and communication technology due to its very high capability of making various businesses and industries more productive and efficient. This productivity comes from the emergence of innovation and the introduction of new capabilities for businesses. Different industries have shown varying reactions to IOT, but wha...
متن کاملاثر اینترنت برکسب مزیت رقابتی (مطالعه تحقیقی پیرامون دفاتر خدمات مسافرتی و گردشگری شهر تهران)
Considering the nature of tourism, which working in it demands competing with all tour and travel agencies in the world, it is vital for travel agencies to achieve competitive advantage if they want to attract international tourists. In one hand, emergence of internet dramatically has changed competitive-ness advantage acquisition, and on the other hand, tourism industry is highly dependent to ...
متن کاملEstimation of the Parameters of the Lomax Distribution using the EM Algorithm and Lindley Approximation
Estimation of statistical distribution parameter is one of the important subject of statistical inference. Due to the applications of Lomax distribution in business, economy, statistical science, queue theory, internet traffic modeling and so on, in this paper, the parameters of Lomax distribution under type II censored samples using maximum likelihood and Bayesian methods are estimated. Wherea...
متن کاملDetecting Threat E-mails using Bayesian Approach
Fraud and terrorism have a close connect in terms of the processes that enables and promote them. In the era of Internet, its various services that include Web, e-mail, social networks, blogs, instant messaging, chats, etc. are used in terrorism not only for communication but also for i) creation of ideology, ii) resource gathering, iii) recruitment, indoctrination and training, iv) creation of...
متن کاملAuthor gender identification from text using Bayesian Random Forest
Nowadays high usage of users from virtual environments and their connection via social networks like Facebook, Instagram, and Twitter shows the necessity of finding out shared subjects in this environment more than before. There are several applications that benefit from reliable methods for inferring age and gender of users in social media. Such applications exist across a wide area of fields,...
متن کامل