標題: Titlebook: Advances in Social Simulation; Proceedings of the 9 Bogumi? Kamiński,Grzegorz Koloch Conference proceedings 2014 Springer-Verlag Berlin Hei [打印本頁] 作者: 浮標 時間: 2025-3-21 18:55
書目名稱Advances in Social Simulation影響因子(影響力)
書目名稱Advances in Social Simulation影響因子(影響力)學科排名
書目名稱Advances in Social Simulation網(wǎng)絡(luò)公開度
書目名稱Advances in Social Simulation網(wǎng)絡(luò)公開度學科排名
書目名稱Advances in Social Simulation被引頻次
書目名稱Advances in Social Simulation被引頻次學科排名
書目名稱Advances in Social Simulation年度引用
書目名稱Advances in Social Simulation年度引用學科排名
書目名稱Advances in Social Simulation讀者反饋
書目名稱Advances in Social Simulation讀者反饋學科排名
作者: 問到了燒瓶 時間: 2025-3-21 21:59 作者: 狼群 時間: 2025-3-22 04:23
Network Security Protocols in Practice,colleagues, by taking into account competing offers that other agents may make. Our results suggest that agents experience diminishing returns on orders of theory of mind higher than level two, similar to what is seen in people. These findings corroborate those in more abstract settings.作者: 騙子 時間: 2025-3-22 05:11
On the Quality of a Social Simulation Model: A Lifecycle Framework,nt-based modeling) contribute further specific requirements for assessing quality. This paper proposes and discusses a set of dimensions for discerning quality in social simulations, especially agent-based models, beyond the traditional standards of verification and validation.作者: 空洞 時間: 2025-3-22 12:14
Simulating Innovation: Comparing Models of Collective Knowledge, Technological Evolution and Emergeion [7]. The models are compared for the ways they represent knowledge and/or technologies, how novelty enters the system, the degree to which they represent open-ended systems, their use of networks, landscapes and other pre-defined structures, and the patterns that emerge from their operations, in作者: SYN 時間: 2025-3-22 14:24
Agent-Based Models for Higher-Order Theory of Mind,colleagues, by taking into account competing offers that other agents may make. Our results suggest that agents experience diminishing returns on orders of theory of mind higher than level two, similar to what is seen in people. These findings corroborate those in more abstract settings.作者: FLUSH 時間: 2025-3-22 18:27 作者: abysmal 時間: 2025-3-22 22:09 作者: 輕快來事 時間: 2025-3-23 04:58
Security Evaluation of Computer Productslysis of social systems. Extant standards of scientific quality and excellence have been inherited through the history and philosophy of science in terms of basic principles, such as formalization, testing, replication, and dissemination. More specifically, the properties of Truth, Beauty, and Justi作者: 愉快么 時間: 2025-3-23 06:58 作者: 清楚 時間: 2025-3-23 10:16
Computer Network Vulnerabilitiese. The models are identical in most aspects, but one model uses a utility-approach to represent farmers’ decision-making, while the other uses satisficing. The model-comparison exercise helps to distinguish substantial from implementation-dependent conclusions drawn from the model(s), and confirms t作者: 親密 時間: 2025-3-23 15:31
Security Threats to Computer Networksfined a set of elementary dynamic models based on classic random and preferential networks. Focusing on edge dynamics, we defined several processes for changing networks with a fixed set of vertices. We applied simple rules, including the combination of random, preferential and assortative mixing of作者: Decline 時間: 2025-3-23 21:49 作者: dyspareunia 時間: 2025-3-24 01:22
https://doi.org/10.1007/b106962 a non-perfect S-curve, but show a saddle point, which is displayed as a double-S. The reasons behind this phenomenon have been little studied in the literature. This paper addresses the emergence of the double-S phenomenon in the innovation diffusion process and provides an explanation for it. In o作者: chandel 時間: 2025-3-24 05:43
Security Assessment, Analysis, and Assuranceperience accidents such as explosions and oil spills. They have to make clear production rate limits to mitigate the human related risks that cause accidents. In this study, we model plant workers using an agent-based simulation to estimate the limits. The proposed model represents that plant worker作者: AMEND 時間: 2025-3-24 09:50
Security in Wireless Networks and Devicesr’s Dilemma with a moral component. We assume that agents evaluate the game’s outcomes with respect to their ideality degree (. how much a given outcome conforms to the player’s moral values), based on two proposed notions on ethical preferences: Harsanyi’s and Rawls’. Based on such game, we constru作者: gastritis 時間: 2025-3-24 10:43 作者: 中子 時間: 2025-3-24 15:55 作者: Alopecia-Areata 時間: 2025-3-24 22:24 作者: 直覺好 時間: 2025-3-25 00:39 作者: archenemy 時間: 2025-3-25 05:31 作者: Crumple 時間: 2025-3-25 08:07 作者: 晚間 時間: 2025-3-25 15:20
The Art of Intrusion Detection,d the quality of their manuscripts, (b) the correlation between manuscript quality and quality judged by peer reviewers, (c) the weights reviewers and editors gave judged quality versus number of previous publications (tract record), and (d) the proportion of manuscripts accepted for publication. Th作者: fluffy 時間: 2025-3-25 16:35
The Art of Intrusion Detection,tion, knowledge dynamics and the emergence of innovation networks. By representing micro-level interactions they provide insight into the mechanisms by which are generated various stylised facts about innovation phenomena. This paper summarises work carried out as part of the . project and to be cov作者: prostatitis 時間: 2025-3-25 21:36
https://doi.org/10.1007/978-3-540-79698-5iction. We proved that the best MG-based predictor is constituted by a tremendously degenerated system, when only one agent is involved. The prediction is the most efficient if the agent is equipped with all strategies from the Full Strategy Space. Despite the casual simplicity of the method its use作者: Intuitive 時間: 2025-3-26 00:41 作者: buoyant 時間: 2025-3-26 07:05 作者: Infect 時間: 2025-3-26 08:49 作者: follicular-unit 時間: 2025-3-26 12:38
Computer Network Vulnerabilitiese. The models are identical in most aspects, but one model uses a utility-approach to represent farmers’ decision-making, while the other uses satisficing. The model-comparison exercise helps to distinguish substantial from implementation-dependent conclusions drawn from the model(s), and confirms the importance of model robustness tests.作者: 財產(chǎn) 時間: 2025-3-26 17:58
https://doi.org/10.1007/978-3-540-79698-5ose a macroeconomic microfounded framework with heterogeneous agents in which households, firms, and banks interact according to decentralised matching processes. The main result is that growing inequality leads to more macroeconomic volatility, increasing the likelihood of observing large unemployment crises.作者: expdient 時間: 2025-3-27 00:41 作者: 無禮回復(fù) 時間: 2025-3-27 02:44 作者: Freeze 時間: 2025-3-27 08:27 作者: 有毒 時間: 2025-3-27 10:34 作者: scotoma 時間: 2025-3-27 15:44
A New Framework for ABMs Based on Argumentative Reasoning,es. We argue that this approach can be beneficial in social simulations, allowing for a better representation of agent reasoning, that is also accessible to the non computer science savvy, thus filling a gap between scholars that use BDI frameworks and scholars who do not in social sciences.作者: 不適當 時間: 2025-3-27 18:45 作者: 忙碌 時間: 2025-3-27 22:32 作者: Guileless 時間: 2025-3-28 04:52 作者: HARD 時間: 2025-3-28 06:30 作者: AGOG 時間: 2025-3-28 10:51
Access Control and Authorizationuss how static and dynamic nature of networks may be compared. We conclude by urging a more comprehensive, transparent and rigorous approach to comparing simulation-generated networks against the available data.作者: incisive 時間: 2025-3-28 14:37 作者: altruism 時間: 2025-3-28 19:44
Security Assessment, Analysis, and Assurancelant size, and the plant equipment degradation rate. The experimental results show that the proposed model can estimate the limits for different sizes of the three factors. The results imply that the limit estimation made by the proposed model is very crucial for plant operations to mitigate human-related accidents.作者: 不能強迫我 時間: 2025-3-29 01:58
A Secure Way to Combine IPsec, NAT & DHCP time interval. We calibrate our simulation with respect to experimental evidence of tax compliance in France and Germany and give estimates for the percentage of selfish agents in these countries. This implies different policy recommendations that may work to fight the shadow economy, tax evasion, and the like.作者: 過濾 時間: 2025-3-29 04:56 作者: 投射 時間: 2025-3-29 09:52
The Art of Intrusion Detection,e peer review process, favouring authors who develop a track record of publications in the first cycles of journal publication while excluding many equally-talented or more-talented authors from publishing (the .; Merton, 1968). Implications for declines in the quality of published manuscripts and for wasting talent are discussed.作者: stroke 時間: 2025-3-29 14:15 作者: 看法等 時間: 2025-3-29 17:53 作者: 保全 時間: 2025-3-29 20:52
Estimation of Production Rate Limits Using Agent-Based Simulation for Oil and Gas Plants Safety,lant size, and the plant equipment degradation rate. The experimental results show that the proposed model can estimate the limits for different sizes of the three factors. The results imply that the limit estimation made by the proposed model is very crucial for plant operations to mitigate human-related accidents.作者: Carcinoma 時間: 2025-3-30 00:46 作者: 責問 時間: 2025-3-30 07:38
,Effects of Corporate Tax Rate Cuts on Firms’ Investment and Valuation: A Microsimulation Approach, of tax deferred accounts. We find that past profitability and variability of each firm is crucial to hit exact threshold points at which firms experience value appreciations or not. The results possess important implications to both regulators and corporate financial managers.作者: JADED 時間: 2025-3-30 09:36 作者: Entrancing 時間: 2025-3-30 12:23
2194-5357 d, September 16-20, 2013.Written by leading experts in the f.This book is the conference proceedings of ESSA 2013, the 9.th. Conference of the European Social Simulation Association. ESSA conferences constitute annual events, which serve as an international platform for the exchange of ideas and dis作者: SLING 時間: 2025-3-30 18:06
Security in Wireless Networks and Devicesme conforms to the player’s moral values), based on two proposed notions on ethical preferences: Harsanyi’s and Rawls’. Based on such game, we construct and agent-based model of moral guilt, where the intensity of an agent’s guilt feeling plays a determinant role in her course of action. Results for both constructions of ideality are analyzed.作者: 招待 時間: 2025-3-30 23:01
The Art of Intrusion Detection,viding .ublic .ood.) of preference-guided action selection of individuals in public good dilemmas [1]. We introduce the HAPPenInGS theory and present results of a series of simulation exercises scrutinising the interplay of individual-level preferences, perceptions and behaviours, and macro-level outcomes.作者: 保守 時間: 2025-3-31 03:44
Moral Guilt: An Agent-Based Model Analysis,me conforms to the player’s moral values), based on two proposed notions on ethical preferences: Harsanyi’s and Rawls’. Based on such game, we construct and agent-based model of moral guilt, where the intensity of an agent’s guilt feeling plays a determinant role in her course of action. Results for both constructions of ideality are analyzed.作者: Myosin 時間: 2025-3-31 06:01 作者: 變量 時間: 2025-3-31 09:53
The Art of Anti Malicious Software,ed model shows indication that vaccination with screening organized alongside would be effective measures against cervical cancer. It also alarms authorities that processes like aging of society and increase of sexual activity (which are taking place in Poland at the moment) could recall epidemic, if prevention would not act properly.作者: Afflict 時間: 2025-3-31 13:58
https://doi.org/10.1007/978-3-540-79698-5fulness is invaluable in many cases including real problems. The significant power of the method lies in its ability to fast adaptation if .-GCMG modification is used. The success rate of prediction is sensitive to the properly set memory length. We considered the feasibility of prediction for the Minority and Majority games.作者: conscience 時間: 2025-3-31 21:35
Conference proceedings 2014 using qualitative data to inform behavioral rules. We are convinced that this book will serve interested readers as a useful compendium which presents in a nutshell the most recent advances at the frontiers of social simulation research..作者: BUOY 時間: 2025-4-1 00:44 作者: 分散 時間: 2025-4-1 05:35
Security in Wireless Networks and Devicesassociated to the performance of those actions, they can be used in a combined way, where the norms are specified in the MSPP ., which support periodicity, and the normalized routines in the MOISE+ model.作者: 駕駛 時間: 2025-4-1 08:24
Model-Based Security Event Managementhment, but also reputation-based partner selection proves effective in maintaining cooperation. However, when agents are informed about free-riders’ reputation and play Defect, cooperation decreases. Finally, a combination of punishment and reputation-based partner selection leads to higher cooperation rates.作者: 空氣 時間: 2025-4-1 13:11 作者: 香料 時間: 2025-4-1 14:23
Analyzing the Problem of the Modeling of Periodic Normalized Behaviors in Multiagent-Based Simulatiassociated to the performance of those actions, they can be used in a combined way, where the norms are specified in the MSPP ., which support periodicity, and the normalized routines in the MOISE+ model.作者: oblique 時間: 2025-4-1 20:46 作者: 按等級 時間: 2025-4-1 22:53