Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)

Learn how to employ JADE to build multi-agent systems!

JADE (Java Agent DEvelopment framework) is a middleware for the development of applications, both in the mobile and fixed environment, based on the Peer-to-Peer intelligent autonomous agent approach. JADE enables developers to implement and...

Utilizing Problem Structure in Planning: A Local Search Approach
Utilizing Problem Structure in Planning: A Local Search Approach
Planning is a crucial skill for any autonomous agent, be it a physically embedded agent, such as a robot, or a purely simulated software agent. For this reason, planning, as a central research area of artificial intelligence from its beginnings, has gained even more attention and importance recently.

After giving a general introduction to AI...

Artifical Intelligence for Human Computing: ICMI 2006 and IJCAI 2007 International Workshops, Banff, Canada, November 3, 2006 Hyderabad
Artifical Intelligence for Human Computing: ICMI 2006 and IJCAI 2007 International Workshops, Banff, Canada, November 3, 2006 Hyderabad
This volume in the Lecture Notes of Artificial Intelligence represents the first book on human computing. We introduced the notion of human computing in 2006 and organized two events that were meant to explain this notion and the research conducted worldwide in the context of this notion.

The first of these events
...
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory

Examine what would happen if we were to deploy blockchain technology at the sovereign level and use it to create a decentralized cashless economy. This book explains how finance and economics work today, and how the convergence of various technologies related to the financial sector can help us find solutions to problems,...

Wireless Sensor Networks: Technology, Protocols, and Applications
Wireless Sensor Networks: Technology, Protocols, and Applications
Infrastructure for Homeland Security Environments

Wireless Sensor Networks helps readers discover the emerging field of low-cost standards-based sensors that promise a high order of spatial and temporal resolution and accuracy in an ever-increasing universe of applications. It shares the latest advances in science and engineering paving the way...

Multiagent Engineering: Theory and Applications in Enterprises
Multiagent Engineering: Theory and Applications in Enterprises
This handbook gives an overview on engineering of business information systems with agent technology. It introduces into this challenge, describes how to identify and to address the relevant technical problems, and explains how to engineer, integrated and test multiagent systems for real world applications. The book gives detailed descriptions of...
Intelligent Computer Graphics 2011 (Studies in Computational Intelligence)
Intelligent Computer Graphics 2011 (Studies in Computational Intelligence)
Intelligent techniques are used since several years in various research areas using computer programs. The purpose of using intelligent techniques is generally to optimise the processing time, to find more accurate solutions, for a lot of problems, than with traditional methods, or simply to find solutions in problems where...
Tragic Design: The Impact of Bad Product Design and How to Fix It
Tragic Design: The Impact of Bad Product Design and How to Fix It

Bad design is everywhere, and its cost is much higher than we think. In this thought-provoking book, authors Jonathan Shariat and Cynthia Savard Saucier explain how poorly designed products can anger, sadden, exclude, and even kill people who use them. The designers responsible certainly didn’t intend harm, so what can you do...

Distributed Search by Constrained Agents: Algorithms, Performance, Communication
Distributed Search by Constrained Agents: Algorithms, Performance, Communication
Agent technology is evolving as a leading field of research connected to diverse areas such as A.I., E-commerce, robotics and information retrieval. Agents systems use reasoning and constraint-based reasoning that has a wide potential for representing multiple types of problems. A fundamental building block within all these areas is the ability to...
Pinning Control of Complex Networked Systems: Synchronization, Consensus and Flocking of Networked Systems via Pinning
Pinning Control of Complex Networked Systems: Synchronization, Consensus and Flocking of Networked Systems via Pinning

Synchronization, consensus and flocking are ubiquitous requirements in networked systems. Pinning Control of Complex Networked Systems investigates these requirements by using the pinning control strategy, which aims to control the whole dynamical network with huge numbers of nodes by imposing controllers for only a fraction of...

Intrusion Prevention and Active Response : Deploying Network and Host IPS
Intrusion Prevention and Active Response : Deploying Network and Host IPS
From the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute

Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be...

Networked Neighbourhoods: The Connected Community in Context
Networked Neighbourhoods: The Connected Community in Context
The setting for this book is the networked community. The treatment of the subject matter is broad and interdisciplinary, with contributions from computer science, sociology, design, human factors and communication technology.

The chapter contributors, drawn from across Europe and North America, offer a varied prospectus of commentary,...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy