2,723 research outputs found

    Human-Agent Decision-making: Combining Theory and Practice

    Full text link
    Extensive work has been conducted both in game theory and logic to model strategic interaction. An important question is whether we can use these theories to design agents for interacting with people? On the one hand, they provide a formal design specification for agent strategies. On the other hand, people do not necessarily adhere to playing in accordance with these strategies, and their behavior is affected by a multitude of social and psychological factors. In this paper we will consider the question of whether strategies implied by theories of strategic behavior can be used by automated agents that interact proficiently with people. We will focus on automated agents that we built that need to interact with people in two negotiation settings: bargaining and deliberation. For bargaining we will study game-theory based equilibrium agents and for argumentation we will discuss logic-based argumentation theory. We will also consider security games and persuasion games and will discuss the benefits of using equilibrium based agents.Comment: In Proceedings TARK 2015, arXiv:1606.0729

    Distributed Hybrid Simulation of the Internet of Things and Smart Territories

    Full text link
    This paper deals with the use of hybrid simulation to build and compose heterogeneous simulation scenarios that can be proficiently exploited to model and represent the Internet of Things (IoT). Hybrid simulation is a methodology that combines multiple modalities of modeling/simulation. Complex scenarios are decomposed into simpler ones, each one being simulated through a specific simulation strategy. All these simulation building blocks are then synchronized and coordinated. This simulation methodology is an ideal one to represent IoT setups, which are usually very demanding, due to the heterogeneity of possible scenarios arising from the massive deployment of an enormous amount of sensors and devices. We present a use case concerned with the distributed simulation of smart territories, a novel view of decentralized geographical spaces that, thanks to the use of IoT, builds ICT services to manage resources in a way that is sustainable and not harmful to the environment. Three different simulation models are combined together, namely, an adaptive agent-based parallel and distributed simulator, an OMNeT++ based discrete event simulator and a script-language simulator based on MATLAB. Results from a performance analysis confirm the viability of using hybrid simulation to model complex IoT scenarios.Comment: arXiv admin note: substantial text overlap with arXiv:1605.0487

    A Survey of Brain Inspired Technologies for Engineering

    Full text link
    Cognitive engineering is a multi-disciplinary field and hence it is difficult to find a review article consolidating the leading developments in the field. The in-credible pace at which technology is advancing pushes the boundaries of what is achievable in cognitive engineering. There are also differing approaches to cognitive engineering brought about from the multi-disciplinary nature of the field and the vastness of possible applications. Thus research communities require more frequent reviews to keep up to date with the latest trends. In this paper we shall dis-cuss some of the approaches to cognitive engineering holistically to clarify the reasoning behind the different approaches and to highlight their strengths and weaknesses. We shall then show how developments from seemingly disjointed views could be integrated to achieve the same goal of creating cognitive machines. By reviewing the major contributions in the different fields and showing the potential for a combined approach, this work intends to assist the research community in devising more unified methods and techniques for developing cognitive machines

    The media equation and team formation: Further evidence for experience as a moderator

    Get PDF
    This study extends previous media equation research, which showed that interdependence but not identity leads to team affiliation effects with computers. The current study used an identity manipulation that more closely replicated the manipulation used in traditional team and group formation research than the original media equation research in this area. The study also sought further evidence for the relationship between experience with computers and behaviour reflecting a media equation pattern of results. Sixty students from the University of Queensland voluntarily participated in the study. Participants were assigned to one of three conditions: control, human team (a team made of only humans) or human-computer team (a team made of computers and humans). Questionnaire measures assessing participants’ affective experience, attitudes and opinions were taken. Participants of high experience, but not low experience, when assigned to either of the team conditions enjoyed the tasks completed on the computer more than participants who worked on their own. When assigned to a team that involved a computer, participants of high experience, but not low experience, reacted negatively towards the computer (in comparison to high experience participants working on their own or on a team without a computer as a team member) – rating the information provided by the computer lower, rating themselves as less influenced by the computer and changing their own ratings and rankings to be less like those of the computer. These results are interpreted in light of the ‘Black Sheep’ literature and recognized as a media equation pattern of results

    A European research agenda for lifelong learning

    Get PDF
    It is a generally accepted truth that without a proper educational system no country will prosper, nor will its inhabitants. With the arrival of the post-industrial society, in Europe and elsewhere, it has become increasingly clear that people should continue learning over their entire life-spans lest they or their society suffer the dire consequences. But what does this future lifelong learning society exactly look like? And how then should education prepare for it? What should people learn and how should they do so? How can we afford to pay for all this, what are the socio-economic constraints of the move towards a lifelong-learning society? And, of course, what role can and should the educational establishment of schools and universities play? This are questions that demand serious research efforts, which is what this paper argues for

    Designing Fiction-Based Close Reading Experiences For The High School English Language Arts Classroom

    Get PDF
    The Common Core State Standards are forcing educational professional to develop high-level literacy skills and habits in a student population that is indisputable diverse and generally ill prepared for the demands of the secondary classroom. The practice of close reading is a means of literacy instruction that continually pushes students back into the text to answer text-dependent questions of varying, yet higher, levels of thinking. A variety of lesson plans and text-dependent questions were generated for three pivotal novels to demonstrate close reading as a means of achieving CCSS-level reading and thinking in the general secondary ELA classroom

    Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues

    Full text link
    Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for achieving a refined stage of digital government. Flawless interoperability is essential to share the information between diverse and merely dispersed organisations in several network environments by using computer based tools. Digital government must ensure security for its information systems, including computers and networks for providing better service to the citizens. Governments around the world are increasingly revolving to information sharing and integration for solving problems in programs and policy areas. Evils of global worry such as syndrome discovery and manage, terror campaign, immigration and border control, prohibited drug trafficking, and more demand information sharing, harmonization and cooperation amid government agencies within a country and across national borders. A number of daunting challenges survive to the progress of an efficient information sharing protocol. A secure and trusted information-sharing protocol is required to enable users to interact and share information easily and perfectly across many diverse networks and databases globally.Comment: 20 page
    • …
    corecore