艰苦地移动 发表于 2025-3-26 21:51:02
Fault-Tolerance in XJAF Agent Middlewarere has been actively developing for past seven years at the University of Novi Sad, and is used for both scientific research and educational purposes. One of the most significant features of this middleware is the support for the load-balancing and fault-tolerance. In this paper we present the XJAF严峻考验 发表于 2025-3-27 02:28:21
Generalized Nets for Agent-Based Modelingntelligent agents as economic subjects were developed. The analysis that has been conducted shows that the proposed method is suitable for modeling and assessing information systems based on agents’ technology.CRUE 发表于 2025-3-27 07:34:26
Networking Readers: Using Semantic and Geographical Links to Enhance e-Books Reading Experienceeal world locations and events. A set of Natural Language Processing resources are used to annotate relevant e-books and a framework is developed using the original text and the annotated metadata to detect and display semantic connections within the text and from text to relevant web data. This sysKEGEL 发表于 2025-3-27 11:18:35
Detecting Satire in Italian Political Commentaries annotation based on Appraisal Theory, of some 30 K word texts. The underlying hypothesis is that using this framework it is possible to precisely pinpoint ironic content through the deep semantic analysis of evaluative judgement and appreciation. The paper presents the manual annotation phase reali单挑 发表于 2025-3-27 16:45:37
Semantic Diversification of Text Search Resultsnging relevant information to the user in an effortless manner is no easy task. The search feature set is where search engines compete to win their users and it usually describes in what manner a search engine may be different from others. One of the most challenging features in a search engine is t温和女人 发表于 2025-3-27 19:28:05
Ant Colony System with a Restart Procedure for TSP of the ACO can still be prohibitively slow. We investigate how the recently proposed Restart Procedure (RP) can be used to improve convergence of the Ant Colony System (ACS) algorithm, which is among the most often applied algorithms from the ACO family. In particular, we present a series of computCERE 发表于 2025-3-28 01:04:18
Differential Cryptanalysis of FEAL4 Using Evolutionary Algorithmrithm (.). The main purpose of the developed attack is to find six subkeys of the encryption algorithm, which will be used to decipher the captured ciphertext. Furthermore, an additional heuristic negation operator was introduced to improve local search of .. The algorithm is based on a chosen-plainGeneralize 发表于 2025-3-28 02:21:34
Differential Evolution in a Recommendation System Based on Collaborative Filteringof these systems, new techniques are proposed. One of them is the use of the heuristic algorithm, which learn the user’s preferences and provide tailored suggestions. In this article the application of the Differential Evolution algorithm (DE), with a view to creating neighborhood in a Recommendatio钱财 发表于 2025-3-28 07:58:08
http://reply.papertrans.cn/24/2322/232184/232184_39.pngGORGE 发表于 2025-3-28 12:48:14
A Survey of ADAS Technologies for the Future Perspective of Sensor Fusionvers and the protection of the occupants of vehicles and other persons involved in road traffic have become essential. Rapid technical developments and innovative advances in recent years have enabled the development of plenty of Advanced Driver Assistance Systems that are based on different working