Published online by Cambridge University Press: 05 September 2016
INTRODUCTION
The agent building theory, methodology and tool presented in this book evolved over many years, with developments presented in numerous papers and a series of PhD theses (Tecuci, 1988; Dybala, 1996; Hieb, 1996; Keeling, 1998; Boicu 2002; Bowman, 2002; Boicu, 2006; Le, 2008; Marcu, 2009). Although this book has emphasized the development of Disciple agents for evidence-based reasoning applications, the learning agent theory and technology are applicable and have been applied to a wide range of knowledge-intensive tasks, such as those discussed in Section 1.6.2.
A previous book (Tecuci, 1998) presented the status of this work at that time and included descriptions of Disciple agents for designing plans for loudspeaker manufacturing, for assessing students’ higher-order thinking skills in history or in statistics, for configuring computer systems, and for representing a virtual armored company commander in distributed interactive simulations.
More recent Disciple agents and their applications include Disciple-WA, an agent for the development of military engineering plans; Disciple-COA, for the critiquing of military courses of action; Disciple-COG, for military center of gravity determination; Disciple agents representing virtual experts for collaborative emergency response planning; Disciple-LTA, for intelligence analysis; Disciple-FS, for regulatory compliance in financial services industries; Disciple-WB, for assessing the believability of websites; and Disciple agents for modeling the behavior of violent extremists.
The following sections present four of these agents and their applications. While all illustrate the general agent development approach discussed in this book, they differ in some of their capabilities and appearance, each reflecting a different stage or trajectory in the development of the Disciple approach.
DISCIPLE-WA: MILITARY ENGINEERING PLANNING
The Workaround Planning Problem
The workaround planning problem consists of assessing how rapidly and by what method a military unit can reconstitute or bypass damage to a transportation infrastructure, such as a damaged and/or mined bridge, a blocked tunnel, or a cratered road (Cohen et al. 1998; Jones, 1998).
To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Find out more about the Kindle Personal Document Service.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.