Most of the current swarm model studies and applications try to mimic the collective behaviors of social animals, such as birds and ants. The studies seek to solve tasks similar to...
Xiaohui Cui, Justin M. Beaver, Everett Stiles, Lau...
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Cooperation and collaboration are generally an inherent part of everyday practice, and particularly among nurses. However, the technologies that support these practices are still i...
Several operations of Web-based applications are optimized with respect to the set of resources that will receive the majority of requests in the near future, namely the hot set. U...
This paper presents an approach for building consensus ontologies from the individual ontologies of a network of socially interacting agents. Each agent has its own conceptualizat...