Sciweavers

405 search results - page 47 / 81
» Avatar-centric Risk Evaluation
Sort
View
ICIS
2001
14 years 11 months ago
Looking Without Seeing: Understanding Unsophisticated Consumers' Success and Failure to Detect Internet Deception
Do unsophisticated consumers fall prey to Internet consumer frauds? Why? To answer these questions this paper integrates two streams of empirical research: the process-oriented th...
Stefano Grazioli, Alex Wang
AAAI
1998
14 years 11 months ago
Opponent Modeling in Poker
Poker is an interesting test-bed for artificial intelligence research. It is a game of imperfect knowledge, where multiple competing agents must deal with risk management, agent m...
Darse Billings, Denis Papp, Jonathan Schaeffer, Du...
ICMAS
1998
14 years 11 months ago
Principles of Trust for MAS: Cognitive Anatomy, Social Importance, and Quantification
After arguing about the crucial importance of trust for Agents and MAS, we provide a definition of trust both as a mental state and as a social attitude and relation. We present t...
Cristiano Castelfranchi, Rino Falcone
WCE
2007
14 years 11 months ago
Agent-Based Perception of an Environment in an Emergency Situation
Abstract—We are interested in the problem of multiagent systems development for risk detecting and emergency response in an uncertain and partially perceived environment. The eva...
Fahem Kebair, Frédéric Serin, Cyrill...
DSS
2006
91views more  DSS 2006»
14 years 9 months ago
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. Howev...
Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie ...