Abstract We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating multiple pseudonyms. We show that it is possible ...
Psychology and cognitive neuroscience researches are increasingly showing how emotion plays a crucial role in cognitive processes. Gradually, this knowledge is being used in Artifi...
Jackeline Spinola de Freitas, Ricardo R. Gudwin, J...
The growth of mobile technology has made recording of user’s location possible. The systems that intent to use location in order to register user’s movement and to use the gen...
A multiagent architecture for vehicle and structural health monitoring is proposed. A prototype using this architecture was developed using JADE. Critical aspects of the design wer...
Albert C. Esterline, Bhanu Gandluri, Mannur Sundar...
Controlling the sensing of an environment by an agent has been accepted as necessary for effective operation within most practical domains. Usually, however, agents operate in par...