Sciweavers

7395 search results - page 15 / 1479
» Social Modeling and i*
Sort
View
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
14 years 1 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
ATAL
2011
Springer
13 years 9 months ago
ESCAPES: evacuation simulation with children, authorities, parents, emotions, and social comparison
In creating an evacuation simulation for training and planning, realistic agents that reproduce known phenomenon are required. Evacuation simulation in the airport domain requires...
Jason Tsai, Natalie Fridman, Emma Bowring, Matthew...
HRI
2006
ACM
15 years 3 months ago
How may I serve you?: a robot companion approaching a seated person in a helping context
This paper presents the combined results of two studies that investigated how a robot should best approach and place itself relative to a seated human subject. Two live Human Robo...
Kerstin Dautenhahn, Michael L. Walters, Sarah Wood...
ATAL
2009
Springer
15 years 4 months ago
Bounded practical social reasoning in the ESB framework
Reasoning about others, as performed by agents in order to coordinate their behaviours with those of others, commonly involves forming and updating beliefs about hidden system pro...
Iain Wallace, Michael Rovatsos
KESAMSTA
2009
Springer
15 years 2 months ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial