Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
In this work, we propose a design for a user attention model featuring three core components. Our system components can work in real-time, offering indications of user attention f...
Christopher Peters, Stylianos Asteriadis, Genaro R...
The World Wide Web lacks support for explaining information provenance. When web applications return results, many users do not know what information sources were used, when they ...
This paper describes the Organization-based Multiagent System Engineering (O-MaSE) Process Framework, which helps process engineers define custom multiagent systems development pr...
On-line transducers are an important class of computational agent; we construct and compose together many software systems using them, such as stream processors, layered network p...