2,723 research outputs found
Human-Agent Decision-making: Combining Theory and Practice
Extensive work has been conducted both in game theory and logic to model
strategic interaction. An important question is whether we can use these
theories to design agents for interacting with people? On the one hand, they
provide a formal design specification for agent strategies. On the other hand,
people do not necessarily adhere to playing in accordance with these
strategies, and their behavior is affected by a multitude of social and
psychological factors. In this paper we will consider the question of whether
strategies implied by theories of strategic behavior can be used by automated
agents that interact proficiently with people. We will focus on automated
agents that we built that need to interact with people in two negotiation
settings: bargaining and deliberation. For bargaining we will study game-theory
based equilibrium agents and for argumentation we will discuss logic-based
argumentation theory. We will also consider security games and persuasion games
and will discuss the benefits of using equilibrium based agents.Comment: In Proceedings TARK 2015, arXiv:1606.0729
Distributed Hybrid Simulation of the Internet of Things and Smart Territories
This paper deals with the use of hybrid simulation to build and compose
heterogeneous simulation scenarios that can be proficiently exploited to model
and represent the Internet of Things (IoT). Hybrid simulation is a methodology
that combines multiple modalities of modeling/simulation. Complex scenarios are
decomposed into simpler ones, each one being simulated through a specific
simulation strategy. All these simulation building blocks are then synchronized
and coordinated. This simulation methodology is an ideal one to represent IoT
setups, which are usually very demanding, due to the heterogeneity of possible
scenarios arising from the massive deployment of an enormous amount of sensors
and devices. We present a use case concerned with the distributed simulation of
smart territories, a novel view of decentralized geographical spaces that,
thanks to the use of IoT, builds ICT services to manage resources in a way that
is sustainable and not harmful to the environment. Three different simulation
models are combined together, namely, an adaptive agent-based parallel and
distributed simulator, an OMNeT++ based discrete event simulator and a
script-language simulator based on MATLAB. Results from a performance analysis
confirm the viability of using hybrid simulation to model complex IoT
scenarios.Comment: arXiv admin note: substantial text overlap with arXiv:1605.0487
A Survey of Brain Inspired Technologies for Engineering
Cognitive engineering is a multi-disciplinary field and hence it is difficult
to find a review article consolidating the leading developments in the field.
The in-credible pace at which technology is advancing pushes the boundaries of
what is achievable in cognitive engineering. There are also differing
approaches to cognitive engineering brought about from the multi-disciplinary
nature of the field and the vastness of possible applications. Thus research
communities require more frequent reviews to keep up to date with the latest
trends. In this paper we shall dis-cuss some of the approaches to cognitive
engineering holistically to clarify the reasoning behind the different
approaches and to highlight their strengths and weaknesses. We shall then show
how developments from seemingly disjointed views could be integrated to achieve
the same goal of creating cognitive machines. By reviewing the major
contributions in the different fields and showing the potential for a combined
approach, this work intends to assist the research community in devising more
unified methods and techniques for developing cognitive machines
The media equation and team formation: Further evidence for experience as a moderator
This study extends previous media equation research, which showed that interdependence but not identity leads to team affiliation effects with computers. The current study used an identity manipulation that more closely replicated the manipulation used in traditional team and group formation research than the original media equation research in this area. The study also sought further evidence for the relationship between experience with computers and behaviour reflecting a media equation pattern of results. Sixty students from the University of Queensland voluntarily participated in the study. Participants were assigned to one of three conditions: control, human team (a team made of only humans) or human-computer team (a team made of computers and humans). Questionnaire measures assessing participants’ affective experience, attitudes and opinions were taken. Participants of high experience, but not low experience, when assigned to either of the team conditions enjoyed the tasks completed on the computer more than participants who worked on their own. When assigned to a team that involved a computer, participants of high experience, but not low experience, reacted negatively towards the computer (in comparison to high experience participants working on their own or on a team without a computer as a team member) – rating the information provided by the computer lower, rating themselves as less influenced by the computer and changing their own ratings and rankings to be less like those of the computer. These results are interpreted in light of the ‘Black Sheep’ literature and recognized as a media equation pattern of results
A European research agenda for lifelong learning
It is a generally accepted truth that without a proper educational system no country will prosper, nor will its inhabitants. With the arrival of the post-industrial society, in Europe and elsewhere, it has become increasingly clear that people should continue learning over their entire life-spans lest they or their society suffer the dire consequences. But what does this future lifelong learning society exactly look like? And how then should education prepare for it? What should people learn and how should they do so? How can we afford to pay for all this, what are the socio-economic constraints of the move towards a lifelong-learning society? And, of course, what role can and should the educational establishment of schools and universities play? This are questions that demand serious research efforts, which is what this paper argues for
Designing Fiction-Based Close Reading Experiences For The High School English Language Arts Classroom
The Common Core State Standards are forcing educational professional to develop high-level literacy skills and habits in a student population that is indisputable diverse and generally ill prepared for the demands of the secondary classroom. The practice of close reading is a means of literacy instruction that continually pushes students back into the text to answer text-dependent questions of varying, yet higher, levels of thinking. A variety of lesson plans and text-dependent questions were generated for three pivotal novels to demonstrate close reading as a means of achieving CCSS-level reading and thinking in the general secondary ELA classroom
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues
Improved interoperability between public and private organizations is of key
significance to make digital government newest triumphant. Digital Government
interoperability, information sharing protocol and security are measured the
key issue for achieving a refined stage of digital government. Flawless
interoperability is essential to share the information between diverse and
merely dispersed organisations in several network environments by using
computer based tools. Digital government must ensure security for its
information systems, including computers and networks for providing better
service to the citizens. Governments around the world are increasingly
revolving to information sharing and integration for solving problems in
programs and policy areas. Evils of global worry such as syndrome discovery and
manage, terror campaign, immigration and border control, prohibited drug
trafficking, and more demand information sharing, harmonization and cooperation
amid government agencies within a country and across national borders. A number
of daunting challenges survive to the progress of an efficient information
sharing protocol. A secure and trusted information-sharing protocol is required
to enable users to interact and share information easily and perfectly across
many diverse networks and databases globally.Comment: 20 page
- …