This chapter presents a generic internal reward system that drives an agent to increase the complexity of its behavior. This reward system does not reinforce a predefined task. It...
This paper extends and builds on previous work that presented a signature-based attack recognition technique. We present general requirements for “survivable attack recognition...
Several manufacturers have recently announced the first simultaneous-multithreaded processors, both as single CPUs and as components of multi-CPU chips. All are small scale, compr...
One of the most important qualities related to the use of information systems is arguably the usability achieved in actual use-situations. Three central criteria for usability as ...
Social awareness is essential for effective learning. However, natural environments do not always provide optimal support for it. We analyze the potentials of Collaborative Virtua...