I posted every month this year! Of course this is a pretty small one….
Category: Uncategorized
Real life MAS
I was reading the article “The Science of Why Our Brains Are Wired to Connect” http://tinyurl.com/m6keshp and I found the following quotes very interesting. We intuitively believe social and physical pain are radically different kinds of experiences, yet the way our brains treat them suggests that they are more similar than we imagine. Also, The neural basis… Continue reading Real life MAS
xkcd: Real Programmers
http://xkcd.com/378/ 🙂
Influence Diagrams, Job Shop Scheduling and Morphological Analysis
Yesterday I learned about a real life online job shop scheduling problem. In the HVAC business calls come in to the office where the office person schedules the job and calls the guys out on the road to tell them where they go next. Sometimes those calls require immediate attention so assigning and saying when… Continue reading Influence Diagrams, Job Shop Scheduling and Morphological Analysis
MASON workshop
Yesterday I attend a MASON workshop. People came from all over the world to present how they are using MASON to do agent based modeling.
Ten holes on a white background
_________________________________ | | | o o o o o | | … Continue reading Ten holes on a white background
Reverse Double Dutch Auction
Seems like an interesting idea for Courier World. Description of a Double Dutch Auction from (Introducing interaction-based auctions into a model agent-based e-commerce system—preliminary considerations): This auction is relatively counterintuitive and in its basic version works like this (based on [1]): a buyer price clock starts ticking at a very high price and continues downward.… Continue reading Reverse Double Dutch Auction
Using Twitter as a proxy for malicious intent
Today I went to a security talk and the speaker gave a demonstration of how when you tweet a link various “robots” will follow the link and index it and do other things. He gave a couple of example of what could be done. One example was tweeting links to login forms with valid user… Continue reading Using Twitter as a proxy for malicious intent
Regender websites
Interesting idea to regender text: http://regender.com/index.html. Maybe websites could use this based on a profile of the person that is entering their website to change the text they display.
xkcd: Lisp
http://xkcd.com/224/