dithiolethione 发表于 2025-3-25 04:13:39
The DoD Encounters the Blogosphere, the world. The blogs themselves are implicitly biased samples, but if one can account for those biases, one can glean an improved awareness. Conceivably, “adversarial” blogs can enrich our understanding of goals, objectives, and reasoning of those who might support anti-Western violence either impl冰河期 发表于 2025-3-25 11:26:43
Integrating Multi-Agent Technology with Cognitive Modeling to Develop an Insurgency Information FraAgent-Oriented Programming (AOP) which is characterized by the use of real-world objects for design and an agent oriented language for implementation. This research integrates the development of multi-agent societies, Electronic Institutions, and Virtual World technology to conduct social computatioBOGUS 发表于 2025-3-25 14:33:25
An Ant Colony Optimization Approach to Expert Identification in Social Networks,e experts in the network. For such cases we extend the basic ACO model and introduce the notion of composibility of pheromones, where trails of different pheromones can be combined to for routing purposes.progestin 发表于 2025-3-25 19:29:18
Attribution-based Anomaly Detection: Trustworthiness in an Online Community,r’s expectations over time . To be able to tell if the employee is trustworthy is thus determined by the subjective perceptions from individuals in his/her social network that have direct business functional connections, and thus the opportunity to repeatedly observe the correspondence between cdearth 发表于 2025-3-25 23:54:35
http://reply.papertrans.cn/87/8694/869376/869376_25.pngferment 发表于 2025-3-26 01:16:04
https://doi.org/10.1007/978-0-387-77672-9Clustering; Internet; Operations Research; Social computing; behavioral modeling and prediction; calculus无表情 发表于 2025-3-26 07:24:53
978-1-4419-4597-6Springer-Verlag US 2008不能根除 发表于 2025-3-26 08:42:03
Computational Models of Multi-National Organizations,An algorithm for designing multi-national organizations that takes into account cultural dimensions is presented and an example from the command and control field is used to illustrate the approach.Hangar 发表于 2025-3-26 15:52:26
http://reply.papertrans.cn/87/8694/869376/869376_29.pngparallelism 发表于 2025-3-26 17:42:45
Online Behavioral Analysis and Modeling Methodology (OBAMM),e used to detect deviations in a users’ online behavior, detecting intrusions, malicious insiders, misallocation of resources, and out-of-band business processes. Successful detection of these behaviors significantly reduces the risk of leaking sensitive data, or inadvertently exposing critical assets.