A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit <a rel="external noopener" href="http://informs-sim.org/wsc13papers/includes/files/034.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
An extended BDI model for human behaviors: Decision-making, learning, interactions, and applications
<span title="">2013</span>
<i title="IEEE">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7n2gtrr2tzevzonkaymviwxhsa" style="color: black;">2013 Winter Simulations Conference (WSC)</a>
</i>
Modeling human decision-making behaviors under a complex and uncertain environment is quite challenging. The goal of this tutorial is to discuss an extended Belief-Desire-Intention (BDI) framework that the authors' research group has been developing last decade to meet such a challenge, integrating models and techniques (e.g. Bayesian Belief Network, Decision Field Theory, Depth First Search) available in the fields of engineering, psychology, computational science, and statistics. First, major
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/wsc.2013.6721437">doi:10.1109/wsc.2013.6721437</a>
<a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/wsc/SonKXM13.html">dblp:conf/wsc/SonKXM13</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/liqi4s64kbbipjejzx6ch3bms4">fatcat:liqi4s64kbbipjejzx6ch3bms4</a>
</span>
more »
... modules of the extended BDI framework are discussed, where those modules represent cognitive functions (i.e. perception, goal seeking, planning, decision-making, execution) of an individual. Then, two extensions are considered, where the first one involves dynamic evolution of underlying modules over time (i.e. learning and forgetting), and the second one involves human interactions (e.g. competition, collaboration, compromise, accommodation, avoidance). To illustrate the proposed approach, various applications are used, such as emergency evacuation during bomb attack, driver and pedestrian behaviors, and cyber social network.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150316114145/http://informs-sim.org/wsc13papers/includes/files/034.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/ab/f4ab9a44341239358c9f3df77deccc50d285569c.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/wsc.2013.6721437">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
ieee.com
</button>
</a>