Catálogo de publicaciones - libros
Agent and Multi-Agent Systems: Technologies and Applications: First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31 - June 1, 2007. Proceedings
Ngoc Thanh Nguyen ; Adam Grzech ; Robert J. Howlett ; Lakhmi C. Jain (eds.)
En conferencia: 1º KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA) . Wrocław, Poland . May 31, 2007 - June 1, 2007
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Artificial Intelligence (incl. Robotics); Information Systems Applications (incl. Internet); Data Mining and Knowledge Discovery; Computer Appl. in Administrative Data Processing; User Interfaces and Human Computer Interaction; Computers and Society
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-72829-0
ISBN electrónico
978-3-540-72830-6
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2007
Tabla de contenidos
An Agent-Based Web Service Composition Using Semantic Information and QoS
Eunjoo Lee; Byungjeong Lee
Applications based on Web service technology have grown rapidly and it has become more and more necessary to select appropriate services. Semantic information and QoS (Quality of Service) are important to choose appropriate services. Since it is hard to match a user’s needs with only a single Web service, the composition of Web services based on workflows is required. To achieve this composition, we utilized our prior research, which suggested that a framework can support a single-service selection based on QoS properties. In this paper, we propose a framework that supports a Web service composition based on semantic information and QoS properties. Three additional elements are extended and added to the prior one: A Broker Agent, a Composition Server and a Composition Agent. This framework is independent of specific composition algorithm. Furthermore, dynamic aspects are considered and supported by a Composition Agent in this framework, which enables a requester to work smoothly with a few loads.
- Special Session: Agent on Networked Media and Its Applications on Next-Generation Convergence Network (ANM07) | Pp. 928-937
Traffic Signal Planning Using a Smart Agent System
You-Sik Hong; Geuk Lee; Cheonshik Kim; Jong Won Kim
The multi-agent systems approach can provide a new desirable solution to the problems of traffic congestion and traffic accidents. Currently, a traffic simulator is needed to understand and explore the difficulties in agent-oriented traffic control. Therefore, in this paper, we propose an electro-sensitive traffic light using a smart agent algorithm to reduce traffic congestion and traffic accidents. Specifically, we designed and implemented a system to create optimum traffic signals in congested conditions using smart agent algorithms. In order to solve these problems, our approach antecedently creates an optimal traffic cycle of passenger car units at the bottom traffic intersection. Mistakes are possible due to different car lengths, car speeds, and the length of the intersection. Therefore, our approach consequently reduces car waiting time and start-up delay time using fuzzy control of feedback data. Urban traffic situations are extremely complex and highly interactive. The proposed method adaptively controls the cycle of traffic signals even though the traffic volume varies. The effectiveness of this method was shown through the simulation of multiple intersections.
- Special Session: Intelligent and Secure Agent for Digital Content Management | Pp. 938-947
Entity Based Message Authentication System
Young-Soo Kim; Sung-Ja Choi; Gang-Soo Lee; Geuk Lee
A critical promotion factor of e-Commerce is message authentication, the procedure that allows communicating parties to verify received messages as authentic. The client-server system has been traditionally used for authentication service. As distributed computing environment has been complicated more and more, Agent system is developed and used extensively for security service. We have designed and successfully tested an agent model for security service which we have named NMAP(New Message Authentication Protocol) to deal with message authentication in the public key cryptosystem. The NMAP’s performance has been shown by various trials of message authentication based on file size and key length. The NMAP’s overall performance on the processing speed is shown to be superior to that of client-server system named PGP. This suggested system will provide an active e-Commerce and non-interactive authentication service.
- Special Session: Intelligent and Secure Agent for Digital Content Management | Pp. 948-955
The Design and Testing of Automated Signature Generation Engine for Worms Detection
Sijung Kim; Geuk Lee; Bonghan Kim
We have proposed automated signature generation engine for unknown attack detection. For this proposal, we have studied signature engine divided into header field and payload field. Especially, in payload field, we proposed signature generation agent which can be presented by using Suffix tree, and Longest Common Subsequence(LCSeq) among them is used to generate new signature automatically. Through the test, Snort signature and generated signature by using Longest Common Subsequence(LCSeq) are compared and evaluated.
- Special Session: Intelligent and Secure Agent for Digital Content Management | Pp. 956-963
User Adaptive Game Characters Using Decision Trees and FSMs
Tae Bok Yoon; Kyo Hyeon Park; Jee Hyong Lee; Keon Myung Lee
Recently, various ways are being explored for enhancing the fun of computer games and lengthening the life cycle of them. Some games, add realistic graphic effect and excellent acoustic effect, and make the tendencies of game players reflected. This paper suggests the method to collect and analyze the action patterns of game players. The game players’ patterns are modeled using FSM (Finite State Machine). The result obtained by analyzing the data on game players is used for creating game-agents which show new action patterns by altering the FSM defined previously. This characters are adaptable game-agent which is learnable the action patterns of game players. The proposal method can be applied to create characters which play the role of partners with game players or the role of enemies against game players.
- Special Session: Intelligent and Secure Agent for Digital Content Management | Pp. 972-981
Blur Detection of Digital Forgery Using Mathematical Morphology
Linna Zhou; Dongming Wang; Yunbiao Guo; Jingfei Zhang
Recent studies on agent techniques for digital content management have been focused on the guarantee of safety and intelligent management. The digital forensic to detect content tampering is a typical application of safety digital content management. Based on the edge processing and analysis using edge preserving smoothing filtering and mathematical morphology, a new blur edge detection scheme is proposed in this paper, which can indicate possible tampering and locate tampered regions without any embedded information such as watermarking technique. Experimental results demonstrate the effectiveness of the proposed scheme.
- Special Session: Intelligent and Secure Agent for Digital Content Management | Pp. 990-998
A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain
Younggyo Lee; Jeonghee Ahn; Seungjoo Kim; Dongho Won
Adil Alsaid and Chris J. Mitchell proposed the possibility of fake root public key installation by an attacker in user’s PC and showed its countermeasures in 2005. The root public keys are used to verify the certificates for applet providers. Therefore the insertion of false public keys allows arbitrary numbers of rogue application to be executed on a user’s PC. We propose a protection method for installing fake root keys in a user’s PC. The method uses the one-time hash chain based on NOVOMODO. In the proposal, as the computation costs and the storage amounts for hash chain are very small, the proposed method will not be a big load to the publisher of the browser, the applet provision agent and the user. The implementation of the method is simple and it offers convenient authentication of the root to the user. Therefore, the method can provide a intelligent and secure agent technique for the digital content distribution.
- Special Session: Intelligent and Secure Agent for Digital Content Management | Pp. 1007-1016
Proposal for a Ubiquitous Virtual Enterprise Reference Model on Next-Generation Convergence Network
Yonghee Shin; Hyori Jeon; Munkee Choi
Nowadays, market environments can be expressed in terms of increased competition, the diverse demands of customers, and the rapid innovation of IT technologies and so forth. These environmental changes have left companies facing a highly competitive market, and company revenues are gradually decreasing. Virtual enterprise is considered as the one of the alternatives available to facilitate adjustment to the new digital economy and save companies from falling into a red ocean. The contents of this research include the definition of virtual enterprise, and the characteristics and technologies for embodying it in a company. The paper suggests a new flow model for a decision support system in a virtual enterprise set-up, assesses critical success factors and weights as per the factors from case studies. From the previous analysis, paper defines the needs of collaborative activities in virtual enterprise and suggests the ubiquitous virtual enterprise reference model.
- Special Session: Intelligent and Secure Agent for Digital Content Management | Pp. 1017-1026
The Hiding of Secret Data Using the Run Length Matching Method
Ki-Hyun Jung; Jae-Gil Yu; Se-Min Kim; Ki-Jong Kim; Jin-Yong Byun; Kee-Young Yoo
This study proposes a data hiding method based on run length encoding. This proposed method uses the location of accumulated run length values, where the cover data run length are compared with the secret data run length. The run length matching (RLM) method uses the run length table which is constructed from the cover and secret data. The experimental results demonstrated that the RLM has advantages with respect to different types of data and run length encoding value match.
- Special Session: Intelligent and Secure Agent for Digital Content Management | Pp. 1027-1034
Agent-Based Connection Control for Digital Content Service
Dragan Jevtic; Marijan Kunstic; Kresimir Cunko
This paper explores improvements that can be achieved by applying intelligent agent techniques to solve the problem of self-adaptive routing. A potential redundancy has been recognized in telecommunication network configuration, hidden in the routing method between the user access points and service providers. The main idea presented here is perpetual trans fer adaptation for all requests that are sent from a user to a service location over all the network elements. Self-adaptation is based on the continuous monitoring of the available communication channel capacity between the user and the service. The actions are based on perpetually seeking the optimal throughput via the nodes that maximize exploitation of the communication channel. From the user’s point of view, accumulation and exploration of knowledge concerning throughput properties in the network can optimally utilize redundant capacities thus providing service more rapidly.
- Special Session: Intelligent and Secure Agent for Digital Content Management | Pp. 1035-1042