نتایج جستجو برای: sensible
تعداد نتایج: 7895 فیلتر نتایج به سال:
A graphical chain model derived from a model selection strategy for the sociologists graduates study
This paper objects to the arising problems due to tting graphical chain models to multidimensional data sets This multivariate statistical tool is used to cope with complex research questions concerning not only direct but also indirect associations between the variables of interest Due to this high complexity sensi ble strategies for tting such models are required Here a data driven selection ...
The development of flexible, responsive and adaptive systems has long been the goal when deploying automated systems operating in complex and dynamic domains. The Sensible Agent architecture is proposed with these goals in mind. Capable of dynamically adapting their level of autonomy, these Sensible Agents perceive, process and respond based on an understanding of both their own goals and syste...
This paper describes a meta-model, MAM, supporting both behavioral and declarative knowledge representation in a Sensible Agent. The paper also provides an example in the air defense domain.
Sensible Agents have been engineered to solve distributed problems in complex, uncertain, and dynamic domains. Each Sensible Agent is composed of four modules (the Action Planner, Perspective Modeler, Conflict Resolution Advisor, and Autonomy Reasoner). These modules endow Sensible Agents with the ability to plan, model, resolve individual conflicts, and change agent system organization. Two co...
In this paper, Extended Statecharts are used as a comprehensive modeling mechanism for the behavior modeling of Sensible Agents. Extended Statecharts allow for the explicit representation of declarable problem-specific agent soft failures, thereby allowing for failure related information to be incorporated within the high level system design. An example of an air defense system is used to illus...
Network Quality of Service (QoS) criteria of interest include conventional metrics such as throughput, delay, loss, and jitter, as well as new QoS criteria based on power utilization, reliability and security. In this paper we suggest a theoretical framework for the characterization and comparison of adaptive routing algorithms which use QoS as the criterion to select between different paths th...
Authentication, the process of identifying an individual, currently plays a critical role in security systems. Graphical password schemes are believed to be more secure and resilient to dictionary attacks than traditional textual passwords. We designed a graphical password system with the novelty of incorporating the sense of touch via haptic technologies. Using haptics, the system utilizes the...
Embodied approaches to language understanding hold that comprehension of linguistic material entails a situated simulation of the situation described. Some recent studies have shown that implicit, explicit, and relational properties of objects implied in a sentence are part of this simulation. However, the issue concerning the extent to which language sensorimotor specificity expressed by lingu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید