使厌恶 发表于 2025-3-26 22:33:47

Abstraction of an Affective-Cognitive Decision Making Model Based on Simulated Behaviour and Percepn abstracted behavioral agent model is obtained, which ensures a substantial increase of the computational efficiency at the cost of approximately 1% behavioural error. The abstraction technique used can be applied to a wide range of internal agent models with loops, for example, involving mutual affective-cognitive interactions.

glamor 发表于 2025-3-27 04:23:13

Location Privacy Protection on Social Networks,otecting options. To the best of our knowledge, this is the first attempt to protect social network users’ location information via text messages. We propose five algorithms for location privacy protection on social networks.

Feckless 发表于 2025-3-27 08:07:53

http://reply.papertrans.cn/87/8694/869379/869379_33.png

改正 发表于 2025-3-27 10:19:24

Conference proceedings 2011eld in College Park, MD, USA, March 29-31, 2011. The 48 papers and 3 keynotes presented in this volume were carefully reviewed and selected from 88 submissions. The papers cover a wide range of topics including social network analysis; modeling; machine learning and data mining; social behaviors; pu

constitute 发表于 2025-3-27 15:31:47

Using Models to Inform Policy: Insights from Modeling the Complexities of Global Polio Eradication,ely and useful answers to critical policy questions when decision makers need them. The talk will include reflections on the opportunities and challenges associated with developing integrated models for complex problems and communicating their results effectively. Dr. Thompson will focus the talk la

exhilaration 发表于 2025-3-27 20:06:37

Toward Culturally Informed Option Awareness for Influence Operations with S-CAT,ions where the impact of culture is both significant and subtle. We describe S-CAT in the context of a hypothetical influence operation that serves as an illustrative use case. One of the many challenges in developing S-CAT involves providing transparency into the model. S-CAT does this by providing

COW 发表于 2025-3-27 23:57:53

http://reply.papertrans.cn/87/8694/869379/869379_37.png

BILK 发表于 2025-3-28 05:15:24

http://reply.papertrans.cn/87/8694/869379/869379_38.png

Inferior 发表于 2025-3-28 08:59:27

Application of a Profile Similarity Methodology for Identifying Terrorist Groups That Use or Pursue, linear and generalized regression modeling provide a set of tools to apply to data that is in the form of cases (named groups) by variables (traits and behaviors of the groups). We turn the conventional regression modeling “inside out” to reveal a network of relations among the cases on the basis

artifice 发表于 2025-3-28 13:26:01

http://reply.papertrans.cn/87/8694/869379/869379_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Social Computing, Behavioral-Cultural Modeling and Prediction; 4th International Co John Salerno,Shanchieh Jay Yang,Sun-Ki Chai Conference