Sold Out
Book Categories |
1 | Flow graphs, their fusion and data analysis | 3 |
2 | Approximation spaces for hierarchical intelligent behavioral system models | 13 |
3 | Distributed adaptive control : beyond single-instant, discrete control variables | 31 |
4 | Multi-agent planning for autonomous agents' coordination | 53 |
5 | Creating common beliefs in rescue situations | 69 |
6 | Coevolutionary processes for strategic decisions | 85 |
7 | Automatic proofs of protocols via program transformation | 99 |
8 | Mereological foundations to approximate reasoning | 117 |
9 | Data security and null value imputation in DIS | 133 |
10 | Basic principles and foundations of information monitoring systems | 147 |
11 | Modelling unreliable and untrustworthy agent behaviour | 161 |
12 | Nearest neighbours without k | 179 |
13 | Classifiers based on approximate reasoning schemes | 191 |
14 | Towards rough applicability of rules | 203 |
15 | On the computer-assisted reasoning about rough sets | 215 |
16 | Similarity-based data reduction and classification | 227 |
17 | Decision trees and reducts for distributed decision tables | 239 |
18 | Learning concept approximation from uncertain decision tables | 249 |
19 | In search for action rules of the lowest cost | 261 |
20 | Circularity in rule knowledge bases detection using decision unit approach | 273 |
21 | Feedforward concept networks | 281 |
22 | Extensions of partial structures and their application to modelling of multiagent systems | 293 |
23 | Tolerance information granules | 305 |
24 | Attribute reduction based on equivalence relation defined on attribute set and its power set | 317 |
25 | Query cost model constructed and analyzed in a dynamic environment | 327 |
26 | The efficiency of the rules' classification based on the cluster analysis method and Salton's method | 333 |
27 | Extracting minimal templates in a decision table | 339 |
28 | Programming bounded rationality | 347 |
29 | Generalized game theory's contribution to multi-agent modelling | 363 |
30 | Multi-agent decision support system for disaster response and evacuation | 385 |
31 | Intelligent system for environmental noise monitoring | 393 |
32 | Multi-agent and data mining technologies for situation assessment in security-related applications | 411 |
33 | Virtual city simulator for education, training, and guidance | 423 |
34 | Neurocomputing for certain bioinformatics tasks | 439 |
35 | Rough set based solutions for network security | 455 |
36 | Task assignment with dynamic token generation | 467 |
37 | DyKnow : a framework for processing dynamic knowledge and object structures in autonomous systems | 479 |
38 | Classifier monitoring using statistical tests | 493 |
39 | What do we learn when we learn by doing? : toward a model of dorsal vision | 501 |
40 | Rough mereology as a language for a minimalist mobile robot's environment description | 509 |
41 | Data acquisition in robotics | 519 |
42 | Spatial sound localization for humanoid | 527 |
43 | Oculomotor humanoid active vision system | 539 |
44 | Crisis management via agent-based simulation | 551 |
45 | Monitoring in multi-agent systems : two perspectives | 563 |
46 | Multi-agent environment for management of crisis in an enterprises-markets complex | 571 |
47 | Behavior based detection of unfavorable events using the multiagent system | 579 |
48 | Intelligent medical systems on Internet technologies platform | 589 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionMonitoring, Security, and Rescue Techniques in Multiagent Systems
X
This Item is in Your InventoryMonitoring, Security, and Rescue Techniques in Multiagent Systems
X
You must be logged in to review the productsX
X
X
Add Monitoring, Security, and Rescue Techniques in Multiagent Systems, In today's society the issue of security has become a crucial one. This volume brings together contributions on the use of knowledge-based technology in security applications by the world's leading researchers in the field., Monitoring, Security, and Rescue Techniques in Multiagent Systems to the inventory that you are selling on WonderClubX
X
Add Monitoring, Security, and Rescue Techniques in Multiagent Systems, In today's society the issue of security has become a crucial one. This volume brings together contributions on the use of knowledge-based technology in security applications by the world's leading researchers in the field., Monitoring, Security, and Rescue Techniques in Multiagent Systems to your collection on WonderClub |