Catálogo de publicaciones - libros
Agent Computing and Multi-Agent Systems: 9th Pacific Rim International Workshop on Multi-Agents, PRIMA 2006, Guilin, China, August 7-8, 2006, Proceedings
Zhong-Zhi Shi ; Ramakoti Sadananda (eds.)
En conferencia: 9º Pacific Rim International Workshop on Multi-Agents (PRIMA) . Guilin, China . August 7, 2006 - August 8, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Artificial Intelligence (incl. Robotics); Computer Communication Networks; Software Engineering; Logics and Meanings of Programs
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-36707-9
ISBN electrónico
978-3-540-36860-1
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Tabla de contenidos
doi: 10.1007/11802372_91
AgentAssembly: The Agent Framework Platform
Ockmer L. Oosthuizen; E. M. Ehlers
This paper discusses the AgentAssebly architecture and specifically the agent framework platform component of the architecture. An introduction is given to the work covered in the paper and previous work (see [1]) this paper is based upon. Then an in-depth discussion is rendered on the agent framework platform provided by the AgentAssembly architecture. The paper concludes with some remarks on the research presented and future aims of the ongoing research project.
- Short Papers | Pp. 760-765
doi: 10.1007/11802372_92
A Multi-agent Architecture for CSCW Systems: From Organizational Semiotics Perspective
Wenge Rong; Kecheng Liu
This paper describes a multi-agent architecture to support CSCW systems modelling. Since CSCW involves different organizations, it can be seen as a social model. From this point of view, we investigate the possibility of modelling CSCW by agent technology, and then based on organizational semiotics method a multi-agent architecture is proposed via using EDA agent model. We explain the components of this multi-agent architecture and design process. It is argued that this approach provides a new perspective for modelling CSCW systems.
- Short Papers | Pp. 766-772
doi: 10.1007/11802372_93
Knowledge Description Model for MAS Utilizing Distributed Ontology Repositories
Kyengwhan Jee; Jung-Jin Yang
The rapid growth of IT technologies enables the quality of human’s daily life to be improved dramatically. Contrasting to the services in previous computing environment directed by user’s request, the services in ubiquitous computing era of new IT technology are provided through recognizing user’s intention and utilizing context-aware information suited to the user. According to the contextual information, agents need to set a dynamic goal to achieve and work collaboratively with other agents. Agents that take control over their behaviors with capability of communicating with other agents become a thrust in this up-coming computing environment. This work focuses on building ontologies, shared knowledge bases among agents, to improve semantical interoperability among agents. More attention is given to the construction and effective management of ontology repository along with its requirement and organization. Ontology agent suggested takes an initiative role to manage the repository in a distributed manner and to facilitate the use of ontology in a multi-agent environment.
- Short Papers | Pp. 773-780
doi: 10.1007/11802372_94
Object Recognition Using K-Nearest Neighbor in Object Space
Jong-Min Kim; Jin-Kyoung Heo; Hwan-Seok Yang; Mang-Kyu Song; Seung-Kyu Park; Woong-Ki Lee
Object recognition technologies using PCA(principal component analysis) recognize objects by deciding representative features of objects in the model image, extracting feature vectors from objects in an image and measuring the distance between them and object representation. Given frequent recognition problems associated with the use of point-to-point distance approach, this study adopted the K-nearest neighbor technique(class-to-class) in which a group of object models of the same class is used as recognition unit for the images inputted on a continual input image. However, we propose the object recognition technique new PCA analysis method that discriminates an object in database even in the case that the variation of illumination in training images exists. Object recognition algorithm proposed here represents more enhanced recognition rate to change of illumination than existing methods.
- Short Papers | Pp. 781-786
doi: 10.1007/11802372_95
Research on Smart Multi-agent Middleware for RFID-Based Ubiquitous Computing Environment
Minwoo Son; Joonhyung Kim; Dongil Shin; Dongkyoo Shin
Previous RFID (Radio Frequency IDentification) middleware did not include intelligent capabilities such as automatically controlling home appliances and users. Therefore, we add USN (Ubiquitous Sensor Network) technology, which recognizes and manages an appliance’s state-information (temperature, humidity, pollution and so on) by connecting RFID tags, and propose the Smart Multi-Agent Middleware architecture for intelligently managing the RFID-based ubiquitous computing environment. We also present the proposed architecture’s execution procedure for controlling ubiquitous appliances.
- Short Papers | Pp. 787-792
doi: 10.1007/11802372_96
Certificate Management System in MANET for Ubiquitous Computing
Dae-Young Lee; Sang-Hyun Bae
This study addressed security requirements for ad-hoc network environments, which lies at the heart of the ubiquitous computing revolution and proposed a partially-distributed certificate management system that can ensure security in mobile ad-hoc networks. The proposed model is characterized by its ability to handle dynamic mobility of nodes, minimize routing load and enhance expandability of network by allowing participating nodes to authenticate each other without being interrupted by joining the cluster. The security, efficiency and robustness of the proposed model were evaluated through simulation.
- Short Papers | Pp. 793-800
doi: 10.1007/11802372_97
FPGA Based Intrusion Detection System Against Unknown and Known Attacks
Dong-Ho Kang; Byoung-Koo Kim; Jin-Tae Oh; Taek-Yong Nam; Jong-Soo Jang
Network intrusion detection systems often rely on matching patterns that are gleaned from known attacks. While this method is reliable and rarely produces false alarms, it has the obvious disadvantage that it cannot detect novel attacks. Accordingly, an alternative approach which can be a combination with pattern matching approach is needed. We have made effort to design and implement high speed protocol anomaly and signature based intrusion detection approach to detect known and unknown attacks. This approach extracts a set of service fields from the application payload where many attacks occur and analyzes the value of fields to verify attack. This approach is implemented on the FPGA (Xilinx Virtex II pro) device to process packet at gigabit-per-second data rates.
- Short Papers | Pp. 801-806
doi: 10.1007/11802372_98
Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks
Jun-Cheol Jeon; Eun-Yeung Choi; Kee-Young Yoo
The current paper proposes a network-based Intrusion Detection System (IDS) that can efficiently detect attacks based on malformed packets that continues to increase, along with more intelligent and skillful hacking techniques. Our system firstly extracts the important features from network packets and analyzes simple attacks and detects IP fragmentation attacks. Thereafter, it collects information from the SA and the FA and other strange information related to the malformed packet. Finally, it judges whether or not an intrusion has occurred on the basis of information gathered from target systems by CAs. The simulation result shows 0% false-positive and 0% false-negative, 100% detection ratio, thereby confirming the accuracy of the proposed IDS in detecting fragmentation attacks.
- Short Papers | Pp. 807-812
doi: 10.1007/11802372_99
Efficient Mutual Authentication Scheme with Smart Card
Eun-Jun Yoon; Kee-Young Yoo
In 2006, both Liu et al. and Yeh proposed an improvement of Chien et al.’s timestamp-based remote user authentication scheme with smart cards, that can withstand parallel session and forgery attacks, respectively. The current paper demonstrates that Liu et al.’s scheme is still vulnerable to a masquerading server attack and a more efficient and secure scheme is needed. One that not only resolves such problems, but also involves less computations and communication than these schemes.
- Short Papers | Pp. 813-818
doi: 10.1007/11802372_100
Strong Mobility for FIPA Compliant Multi-agent Systems
Javed Iqbal; H. Farooq Ahmad; Arshad Ali; Hiroki Suguri; Sarmad Sadik
In recent years popularity of Mobile-Agent systems makes it one of the promising technologies for developing intelligent software systems. The most important issues in the Mobile-Agent system are the migration of agent which can be categorized as Strong or weak. Strong mobility allows the agents to migrate without loss of execution state at any time, a powerful mechanism for implementing peer-to-peer computing environment. We have designed and implemented a strong mobility framework for SAGE (Scalable Fault Tolerant Agent Grooming Environment). Our key objective is to offer efficient and reliable infrastructure for agent’s strong mobility. We have performed a number of experiments to quantitatively evaluate the effectiveness and efficiency of our proposed architecture.
- Short Papers | Pp. 819-824