In this paper we propose and justify a methodology for the development of the control systems, or`cognitive a r c hitectures', of autonomous mobile robots. We argue that the design by hand of such control systems becomes prohibitively diicult as complexity increases. We discuss an alternative approach, involving artiicial evolution, where the basic building… (More)
This paper discusses the role of models in the design of user interfaces, with particular emphasis on integration across different modelling stages. We are concerned with bridging the gap between psychologically motivated modelling approaches to HCI and implementation oriented interaction models, to produce a task-informed user interface design process. An… (More)
Modern user interface development environments are based on fast prototyping which as a methodology does not incorporate any theory or design principles. Adept (Advanced design environment for prototyping with tasks) incorporates a theory of modelling users and user task knowledge known as Task Knowledge Structures , and extends it to a theoretical… (More)
We have developed a methodology grounded in two beliefs: that autonomous agents need visual processing capabilities , and that the approach of hand-designing control architectures for autonomous agents is likely to be superseded by methods involving the artiicial evolution of comparable architectures. In this paper we present results which demonstrate that… (More)
This work examines the interplay of inter-personal and inter-organizational trust, two distinct but related concepts, through a theoretic inter-organizational trust-based security model for a multi-agent system information-sharing community. A calculus that mathematically models trust building at the inter-organizational level is at the heart of this model.… (More)
A rapid prototyping approach to user interface design may be enhanced by integration with a theory of the users' tasks. The paper discusses various approaches to modelling user tasks including task knowledge structures (TKS) which provides a theory of the structure of task knowledge , together with a method for the identification and modelling of this… (More)
– An agent-bas ed model of interpersonal trust is used to develop information sharing security protocols in the spirit of soft security. We demonstrate that availability information can be balanced against security breaches. Our protocols are simple, malleable, and scalable.
The face, iris and finger print are among the most promising biometric authentication that can precisely identify and analysis a person as their unique textures can be quickly extracted during the recognition process. This biometric detection and authentication often deals with non-ideal scenarios such as blurred images, off-angles, reflections, expression… (More)
—Our work on sensor networks and information routing protocols has provided us with an approach to examine secure information in a trust network. In this paper we outline a couple of metrics and offer an analysis of theoretoical minits allowed by our metrics. Our theries are substantiated by simulated experiments.