dithiolethione 发表于 2025-3-25 04:13:39

The DoD Encounters the Blogosphere, the world. The blogs themselves are implicitly biased samples, but if one can account for those biases, one can glean an improved awareness. Conceivably, “adversarial” blogs can enrich our understanding of goals, objectives, and reasoning of those who might support anti-Western violence either impl

冰河期 发表于 2025-3-25 11:26:43

Integrating Multi-Agent Technology with Cognitive Modeling to Develop an Insurgency Information FraAgent-Oriented Programming (AOP) which is characterized by the use of real-world objects for design and an agent oriented language for implementation. This research integrates the development of multi-agent societies, Electronic Institutions, and Virtual World technology to conduct social computatio

BOGUS 发表于 2025-3-25 14:33:25

An Ant Colony Optimization Approach to Expert Identification in Social Networks,e experts in the network. For such cases we extend the basic ACO model and introduce the notion of composibility of pheromones, where trails of different pheromones can be combined to for routing purposes.

progestin 发表于 2025-3-25 19:29:18

Attribution-based Anomaly Detection: Trustworthiness in an Online Community,r’s expectations over time . To be able to tell if the employee is trustworthy is thus determined by the subjective perceptions from individuals in his/her social network that have direct business functional connections, and thus the opportunity to repeatedly observe the correspondence between c

dearth 发表于 2025-3-25 23:54:35

http://reply.papertrans.cn/87/8694/869376/869376_25.png

ferment 发表于 2025-3-26 01:16:04

https://doi.org/10.1007/978-0-387-77672-9Clustering; Internet; Operations Research; Social computing; behavioral modeling and prediction; calculus

无表情 发表于 2025-3-26 07:24:53

978-1-4419-4597-6Springer-Verlag US 2008

不能根除 发表于 2025-3-26 08:42:03

Computational Models of Multi-National Organizations,An algorithm for designing multi-national organizations that takes into account cultural dimensions is presented and an example from the command and control field is used to illustrate the approach.

Hangar 发表于 2025-3-26 15:52:26

http://reply.papertrans.cn/87/8694/869376/869376_29.png

parallelism 发表于 2025-3-26 17:42:45

Online Behavioral Analysis and Modeling Methodology (OBAMM),e used to detect deviations in a users’ online behavior, detecting intrusions, malicious insiders, misallocation of resources, and out-of-band business processes. Successful detection of these behaviors significantly reduces the risk of leaking sensitive data, or inadvertently exposing critical assets.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Social Computing, Behavioral Modeling, and Prediction; Huan Liu,John J. Salerno,Michael J. Young Conference proceedings 2008 Springer-Verl