派博傳思國際中心

標題: Titlebook: Advances in Social Simulation; Proceedings of the 9 Bogumi? Kamiński,Grzegorz Koloch Conference proceedings 2014 Springer-Verlag Berlin Hei [打印本頁]

作者: 浮標    時間: 2025-3-21 18:55
書目名稱Advances in Social Simulation影響因子(影響力)




書目名稱Advances in Social Simulation影響因子(影響力)學科排名




書目名稱Advances in Social Simulation網(wǎng)絡(luò)公開度




書目名稱Advances in Social Simulation網(wǎng)絡(luò)公開度學科排名




書目名稱Advances in Social Simulation被引頻次




書目名稱Advances in Social Simulation被引頻次學科排名




書目名稱Advances in Social Simulation年度引用




書目名稱Advances in Social Simulation年度引用學科排名




書目名稱Advances in Social Simulation讀者反饋




書目名稱Advances in Social Simulation讀者反饋學科排名





作者: 問到了燒瓶    時間: 2025-3-21 21:59

作者: 狼群    時間: 2025-3-22 04:23
Network Security Protocols in Practice,colleagues, by taking into account competing offers that other agents may make. Our results suggest that agents experience diminishing returns on orders of theory of mind higher than level two, similar to what is seen in people. These findings corroborate those in more abstract settings.
作者: 騙子    時間: 2025-3-22 05:11
On the Quality of a Social Simulation Model: A Lifecycle Framework,nt-based modeling) contribute further specific requirements for assessing quality. This paper proposes and discusses a set of dimensions for discerning quality in social simulations, especially agent-based models, beyond the traditional standards of verification and validation.
作者: 空洞    時間: 2025-3-22 12:14
Simulating Innovation: Comparing Models of Collective Knowledge, Technological Evolution and Emergeion [7]. The models are compared for the ways they represent knowledge and/or technologies, how novelty enters the system, the degree to which they represent open-ended systems, their use of networks, landscapes and other pre-defined structures, and the patterns that emerge from their operations, in
作者: SYN    時間: 2025-3-22 14:24
Agent-Based Models for Higher-Order Theory of Mind,colleagues, by taking into account competing offers that other agents may make. Our results suggest that agents experience diminishing returns on orders of theory of mind higher than level two, similar to what is seen in people. These findings corroborate those in more abstract settings.
作者: FLUSH    時間: 2025-3-22 18:27

作者: abysmal    時間: 2025-3-22 22:09

作者: 輕快來事    時間: 2025-3-23 04:58
Security Evaluation of Computer Productslysis of social systems. Extant standards of scientific quality and excellence have been inherited through the history and philosophy of science in terms of basic principles, such as formalization, testing, replication, and dissemination. More specifically, the properties of Truth, Beauty, and Justi
作者: 愉快么    時間: 2025-3-23 06:58

作者: 清楚    時間: 2025-3-23 10:16
Computer Network Vulnerabilitiese. The models are identical in most aspects, but one model uses a utility-approach to represent farmers’ decision-making, while the other uses satisficing. The model-comparison exercise helps to distinguish substantial from implementation-dependent conclusions drawn from the model(s), and confirms t
作者: 親密    時間: 2025-3-23 15:31
Security Threats to Computer Networksfined a set of elementary dynamic models based on classic random and preferential networks. Focusing on edge dynamics, we defined several processes for changing networks with a fixed set of vertices. We applied simple rules, including the combination of random, preferential and assortative mixing of
作者: Decline    時間: 2025-3-23 21:49

作者: dyspareunia    時間: 2025-3-24 01:22
https://doi.org/10.1007/b106962 a non-perfect S-curve, but show a saddle point, which is displayed as a double-S. The reasons behind this phenomenon have been little studied in the literature. This paper addresses the emergence of the double-S phenomenon in the innovation diffusion process and provides an explanation for it. In o
作者: chandel    時間: 2025-3-24 05:43
Security Assessment, Analysis, and Assuranceperience accidents such as explosions and oil spills. They have to make clear production rate limits to mitigate the human related risks that cause accidents. In this study, we model plant workers using an agent-based simulation to estimate the limits. The proposed model represents that plant worker
作者: AMEND    時間: 2025-3-24 09:50
Security in Wireless Networks and Devicesr’s Dilemma with a moral component. We assume that agents evaluate the game’s outcomes with respect to their ideality degree (. how much a given outcome conforms to the player’s moral values), based on two proposed notions on ethical preferences: Harsanyi’s and Rawls’. Based on such game, we constru
作者: gastritis    時間: 2025-3-24 10:43

作者: 中子    時間: 2025-3-24 15:55

作者: Alopecia-Areata    時間: 2025-3-24 22:24

作者: 直覺好    時間: 2025-3-25 00:39

作者: archenemy    時間: 2025-3-25 05:31

作者: Crumple    時間: 2025-3-25 08:07

作者: 晚間    時間: 2025-3-25 15:20
The Art of Intrusion Detection,d the quality of their manuscripts, (b) the correlation between manuscript quality and quality judged by peer reviewers, (c) the weights reviewers and editors gave judged quality versus number of previous publications (tract record), and (d) the proportion of manuscripts accepted for publication. Th
作者: fluffy    時間: 2025-3-25 16:35
The Art of Intrusion Detection,tion, knowledge dynamics and the emergence of innovation networks. By representing micro-level interactions they provide insight into the mechanisms by which are generated various stylised facts about innovation phenomena. This paper summarises work carried out as part of the . project and to be cov
作者: prostatitis    時間: 2025-3-25 21:36
https://doi.org/10.1007/978-3-540-79698-5iction. We proved that the best MG-based predictor is constituted by a tremendously degenerated system, when only one agent is involved. The prediction is the most efficient if the agent is equipped with all strategies from the Full Strategy Space. Despite the casual simplicity of the method its use
作者: Intuitive    時間: 2025-3-26 00:41

作者: buoyant    時間: 2025-3-26 07:05

作者: Infect    時間: 2025-3-26 08:49

作者: follicular-unit    時間: 2025-3-26 12:38
Computer Network Vulnerabilitiese. The models are identical in most aspects, but one model uses a utility-approach to represent farmers’ decision-making, while the other uses satisficing. The model-comparison exercise helps to distinguish substantial from implementation-dependent conclusions drawn from the model(s), and confirms the importance of model robustness tests.
作者: 財產(chǎn)    時間: 2025-3-26 17:58
https://doi.org/10.1007/978-3-540-79698-5ose a macroeconomic microfounded framework with heterogeneous agents in which households, firms, and banks interact according to decentralised matching processes. The main result is that growing inequality leads to more macroeconomic volatility, increasing the likelihood of observing large unemployment crises.
作者: expdient    時間: 2025-3-27 00:41

作者: 無禮回復(fù)    時間: 2025-3-27 02:44

作者: Freeze    時間: 2025-3-27 08:27

作者: 有毒    時間: 2025-3-27 10:34

作者: scotoma    時間: 2025-3-27 15:44
A New Framework for ABMs Based on Argumentative Reasoning,es. We argue that this approach can be beneficial in social simulations, allowing for a better representation of agent reasoning, that is also accessible to the non computer science savvy, thus filling a gap between scholars that use BDI frameworks and scholars who do not in social sciences.
作者: 不適當    時間: 2025-3-27 18:45

作者: 忙碌    時間: 2025-3-27 22:32

作者: Guileless    時間: 2025-3-28 04:52

作者: HARD    時間: 2025-3-28 06:30

作者: AGOG    時間: 2025-3-28 10:51
Access Control and Authorizationuss how static and dynamic nature of networks may be compared. We conclude by urging a more comprehensive, transparent and rigorous approach to comparing simulation-generated networks against the available data.
作者: incisive    時間: 2025-3-28 14:37

作者: altruism    時間: 2025-3-28 19:44
Security Assessment, Analysis, and Assurancelant size, and the plant equipment degradation rate. The experimental results show that the proposed model can estimate the limits for different sizes of the three factors. The results imply that the limit estimation made by the proposed model is very crucial for plant operations to mitigate human-related accidents.
作者: 不能強迫我    時間: 2025-3-29 01:58
A Secure Way to Combine IPsec, NAT & DHCP time interval. We calibrate our simulation with respect to experimental evidence of tax compliance in France and Germany and give estimates for the percentage of selfish agents in these countries. This implies different policy recommendations that may work to fight the shadow economy, tax evasion, and the like.
作者: 過濾    時間: 2025-3-29 04:56

作者: 投射    時間: 2025-3-29 09:52
The Art of Intrusion Detection,e peer review process, favouring authors who develop a track record of publications in the first cycles of journal publication while excluding many equally-talented or more-talented authors from publishing (the .; Merton, 1968). Implications for declines in the quality of published manuscripts and for wasting talent are discussed.
作者: stroke    時間: 2025-3-29 14:15

作者: 看法等    時間: 2025-3-29 17:53

作者: 保全    時間: 2025-3-29 20:52
Estimation of Production Rate Limits Using Agent-Based Simulation for Oil and Gas Plants Safety,lant size, and the plant equipment degradation rate. The experimental results show that the proposed model can estimate the limits for different sizes of the three factors. The results imply that the limit estimation made by the proposed model is very crucial for plant operations to mitigate human-related accidents.
作者: Carcinoma    時間: 2025-3-30 00:46

作者: 責問    時間: 2025-3-30 07:38
,Effects of Corporate Tax Rate Cuts on Firms’ Investment and Valuation: A Microsimulation Approach, of tax deferred accounts. We find that past profitability and variability of each firm is crucial to hit exact threshold points at which firms experience value appreciations or not. The results possess important implications to both regulators and corporate financial managers.
作者: JADED    時間: 2025-3-30 09:36

作者: Entrancing    時間: 2025-3-30 12:23
2194-5357 d, September 16-20, 2013.Written by leading experts in the f.This book is the conference proceedings of ESSA 2013, the 9.th. Conference of the European Social Simulation Association. ESSA conferences constitute annual events, which serve as an international platform for the exchange of ideas and dis
作者: SLING    時間: 2025-3-30 18:06
Security in Wireless Networks and Devicesme conforms to the player’s moral values), based on two proposed notions on ethical preferences: Harsanyi’s and Rawls’. Based on such game, we construct and agent-based model of moral guilt, where the intensity of an agent’s guilt feeling plays a determinant role in her course of action. Results for both constructions of ideality are analyzed.
作者: 招待    時間: 2025-3-30 23:01
The Art of Intrusion Detection,viding .ublic .ood.) of preference-guided action selection of individuals in public good dilemmas [1]. We introduce the HAPPenInGS theory and present results of a series of simulation exercises scrutinising the interplay of individual-level preferences, perceptions and behaviours, and macro-level outcomes.
作者: 保守    時間: 2025-3-31 03:44
Moral Guilt: An Agent-Based Model Analysis,me conforms to the player’s moral values), based on two proposed notions on ethical preferences: Harsanyi’s and Rawls’. Based on such game, we construct and agent-based model of moral guilt, where the intensity of an agent’s guilt feeling plays a determinant role in her course of action. Results for both constructions of ideality are analyzed.
作者: Myosin    時間: 2025-3-31 06:01

作者: 變量    時間: 2025-3-31 09:53
The Art of Anti Malicious Software,ed model shows indication that vaccination with screening organized alongside would be effective measures against cervical cancer. It also alarms authorities that processes like aging of society and increase of sexual activity (which are taking place in Poland at the moment) could recall epidemic, if prevention would not act properly.
作者: Afflict    時間: 2025-3-31 13:58
https://doi.org/10.1007/978-3-540-79698-5fulness is invaluable in many cases including real problems. The significant power of the method lies in its ability to fast adaptation if .-GCMG modification is used. The success rate of prediction is sensitive to the properly set memory length. We considered the feasibility of prediction for the Minority and Majority games.
作者: conscience    時間: 2025-3-31 21:35
Conference proceedings 2014 using qualitative data to inform behavioral rules. We are convinced that this book will serve interested readers as a useful compendium which presents in a nutshell the most recent advances at the frontiers of social simulation research..
作者: BUOY    時間: 2025-4-1 00:44

作者: 分散    時間: 2025-4-1 05:35
Security in Wireless Networks and Devicesassociated to the performance of those actions, they can be used in a combined way, where the norms are specified in the MSPP ., which support periodicity, and the normalized routines in the MOISE+ model.
作者: 駕駛    時間: 2025-4-1 08:24
Model-Based Security Event Managementhment, but also reputation-based partner selection proves effective in maintaining cooperation. However, when agents are informed about free-riders’ reputation and play Defect, cooperation decreases. Finally, a combination of punishment and reputation-based partner selection leads to higher cooperation rates.
作者: 空氣    時間: 2025-4-1 13:11

作者: 香料    時間: 2025-4-1 14:23
Analyzing the Problem of the Modeling of Periodic Normalized Behaviors in Multiagent-Based Simulatiassociated to the performance of those actions, they can be used in a combined way, where the norms are specified in the MSPP ., which support periodicity, and the normalized routines in the MOISE+ model.
作者: oblique    時間: 2025-4-1 20:46

作者: 按等級    時間: 2025-4-1 22:53





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
中超| 东兰县| 姚安县| 葫芦岛市| 富平县| 景洪市| 门源| 辽宁省| 峡江县| 南充市| 漠河县| 尚志市| 镇沅| 河源市| 鄂托克旗| 新龙县| 惠安县| 堆龙德庆县| 樟树市| 新巴尔虎左旗| 马鞍山市| 英吉沙县| 福安市| 昭觉县| 澎湖县| 临海市| 察雅县| 洮南市| 汉寿县| 罗城| 嘉义县| 张家川| 万全县| 七台河市| 凤阳县| 洞头县| 钟山县| 石林| 基隆市| 长阳| 中阳县|