There is a growing belief that the agents' cognitive structures play a central role on the enhancement of predicative capacities of decision-making strategies. This paper anal...
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
Weblog is increasingly important over time with researchers anxious to learn why millions of Internet users are so eager to post their own diary on the web everyday. This study co...
This paper presents the mechanisms proposed by a generic cognitive architecture for virtual characters with emotional influenced behaviors, called cognitiva, to maintain behavior ...
We describe the experience of using a combination of requirements engineering techniques (scenarios, storyboards, observation and workshops) in an escience application to develop ...
Sarah Thew, Alistair G. Sutcliffe, Oscar de Bruijn...