transient-pain 发表于 2025-3-27 00:50:25

http://reply.papertrans.cn/16/1512/151108/151108_31.png

Expertise 发表于 2025-3-27 02:51:52

Marc Verboord,Amanda Brandelleroese systems are often nothing more than electronic catalogues on which the user can choose a product which is made available for a fixed price. This modus operandi is clearly failing to exploit the full potential of electronic commerce. Against this background, we argue here that in the next few yea

独行者 发表于 2025-3-27 07:33:11

https://doi.org/10.1057/9781137491268. They are a set of guidelines that the agents of the system have to follow and that structure message passing. This enables agents to communicate knowing the types of messages they can receive, the types of messages they can send and at what time. Given their knowledge bases, what they perceive fro

PANG 发表于 2025-3-27 10:12:07

http://reply.papertrans.cn/16/1512/151108/151108_34.png

Pamphlet 发表于 2025-3-27 14:13:12

http://reply.papertrans.cn/16/1512/151108/151108_35.png

GROUP 发表于 2025-3-27 21:20:57

http://reply.papertrans.cn/16/1512/151108/151108_36.png

Slit-Lamp 发表于 2025-3-27 23:53:38

http://reply.papertrans.cn/16/1512/151108/151108_37.png

进步 发表于 2025-3-28 04:48:41

https://doi.org/10.1057/9780230244788accessed by customers with different backgrounds, expertise and preferences; therefore, their usability can only be improved by personalizing their interfaces to the needs of each specific user. In this paper, we describe the architecture of SETA, a prototype toolkit for the creation of adaptive Web

外面 发表于 2025-3-28 07:17:22

https://doi.org/10.1057/9780230244788ing systems. They can be made more useful by integrating problem-solving capabilities into the information systems. This poses the challenge of scalability: when hundreds of users access a server at the same time, it is important to avoid excessive computational load..We present the concept of smart

seroma 发表于 2025-3-28 11:17:39

https://doi.org/10.1057/9780230244788y by selected access groups. Java archives may be used as containers of mobile agents, which allows agents to keep confidential data unaccessible while residing on untrusted hosts. However, additional protective measures are required in order to prevent Cut & Paste attacks on mobile agents by malici
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Agent Mediated Electronic Commerce; The European AgentLi Frank Dignum,Carles Sierra Book 2001 Springer-Verlag Berlin Heidelberg 2001 Agent