Catálogo de publicaciones - libros

Compartir en
redes sociales


Agent and Multi-Agent Systems: Technologies and Applications: First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31 - June 1, 2007. Proceedings

Ngoc Thanh Nguyen ; Adam Grzech ; Robert J. Howlett ; Lakhmi C. Jain (eds.)

En conferencia: 1º KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA) . Wrocław, Poland . May 31, 2007 - June 1, 2007

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Artificial Intelligence (incl. Robotics); Information Systems Applications (incl. Internet); Data Mining and Knowledge Discovery; Computer Appl. in Administrative Data Processing; User Interfaces and Human Computer Interaction; Computers and Society

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-72829-0

ISBN electrónico

978-3-540-72830-6

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2007

Tabla de contenidos

A Model for Informed Negotiating Agents

John Debenham; Simeon Simoff

We propose that the key to building intelligent negotiating agents is to take an agent’s historic observations as primitive, to model that agent’s changing uncertainty in that information, and to use that model as the foundation for the agent’s reasoning. We describe an agent architecture, with an attendant theory, that is based on that model. In this approach, the utility of contracts, and the trust and reliability of a trading partner are intermediate concepts that an agent may estimate from its information model. This enables us to describe intelligent agents that are not necessarily utility optimisers, that value information as a commodity, and that build relationships with other agents through the trusted exchange of information as well as contracts.

- Main Track: Negotiating Agents | Pp. 426-435

Power in Norm Negotiation

Guido Boella; Leendert van der Torre

In social mechanism design, norm negotiation creates individual or contractual obligations fulfilling goals of the agents. The social delegation cycle distinguishes among social goal negotiation, obligation and sanction negotiation and norm acceptance. Power may affect norm negotiation in various ways, and we therefore introduce a new formalization of the social delegation cycle based on power and dependence, without referring to the rule structure of norms, actions, decision variables, tasks, and so on.

- Main Track: Negotiating Agents | Pp. 436-446

Quantitative Analysis of Single-Level Single-Mediator Multi-agent Systems

Moon Ho Lee; Aliaksandr Birukou; Alexander Dudin; Valentina Klimenok; Chang-hui Choe

Queueing Theory deals with problems where some restricted resource should be shared between competitive flow of requests. In this paper we use Queueing Theory methods to perform a quantitative analysis of a single-level single-mediator multi-agent system. In the system, several agents, coordinated by the mediator process user queries. We adopt matrix analytic methods to compute performance characteristics in terms of a queueing network of tree-like topology with cooperation of the servers. Results can be used for the logical and technical design and optimal resources sharing in multi-agent systems.

- Main Track: Negotiating Agents | Pp. 447-455

Software Agent Negotiation for Service Composition

Claudia Di Napoli

Service–oriented computing (SOC) is posing new challenges in the management of compositions of services that usually belong to different administrative domains. As such they cannot be provided by adopting a centralized approach, but more sophisticated computing methodologies are necessary.

In this paper we propose to use software agent negotiation to address the problem of composing services in service–oriented environments, like the Grid. In particular, we propose to use software agents to represent service providers and service consumers, and a negotiation protocol to select the service providers that meet the requirements of service consumers on the provision of multiple interconnected services.

The proposed protocol is thought as a protocol to improve the possibility of reaching an agreement by allowing both service consumers and providers to exchange more proposals to accommodate the dynamic and changing nature of service–oriented environments.

- Main Track: Negotiating Agents | Pp. 456-465

A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture

Eduardo Mosqueira-Rey; Amparo Alonso-Betanzos; Belen Baldonedo del Río; Jesús Lago Piñeiro

We describe the design of a misuse detection agent, one of the different agents in a multiagent-based intrusion detection system. This system is being implemented in JADE, a well-known multiagent platform based in Java. The agent analyzes the packets in the network connections using a packet sniffer and then creates a data model based on the information obtained. This data model is the input to a rule-based agent inference engine, which uses the Rete algorithm for pattern matching, and the rules of the signature-based intrusion detection system Snort. Specifically, an implementation in Java language – the Drools-JBoss Rules– was used, and a parser was implemented that converts Snort rules to Drools rules. The use of object-oriented techniques, together with design patterns, means that the agent is flexible, easily configurable and extensible.

- Main Track: Agents for Network Management | Pp. 466-475

An Agent System for Bandwidth Allocation in Reservation-Based Networks Using Evolutionary Computing and Vickrey Auctions

Ángel M. Pérez-Bellido; Sancho Salcedo-Sanz; José A. Portilla-Figueras; Emilio G. Ortíz-García; Pilar García-Díaz

This paper presents an agent system for bandwidth allocation in reservation-based networks, using Vickrey auctions and an evolutionary algorithm. Our evolutionary approach performs the bandwidth allocation to agents which bid for networks resources by means of willingness-to-pay functions. It also calculates in a parallel way the price to be paid to the network’s owner. We tackle the case of one-link, and its extension to a network. Simulations performed have shown the main advantages and problems inherent to this model

- Main Track: Agents for Network Management | Pp. 476-485

Multiagent Approach to Network Traffic Anomalies Uncertainty Level Assessment in Distributed Intrusion Detection System

Grzegorz Kołaczek

The paper proposes a formal framework for network traffic anomalies uncertainty level assessment within a distributed multiagent Intusion Detection System (IDS) architecture. The role of traffic anomalies detection is discussed then it has been clarified how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading). Finally, it has been defined how to use the proposed techniques in distributed IDS.

- Main Track: Agents for Network Management | Pp. 486-495

An Algorithm for Loopless Optimum Paths Finding Agent System and Its Application to Multimodal Public Transit Network

Doohee Nam; Seongil Shin; Changho Choi; Yongtaek Lim; Seung Jae Lee

The entire path deletion methods (EPDM) explore the K-th network transformation in order to prevent the predetermined K-1 number of path(s) from being re-searched in optimum path finding agent system. But, they show a critical drawback for the application in practical traffic network because loops, in which the same node and link are reappeared without limitation, can’t be constrained. The purpose of this paper is to develop a method to selectively control loop-paths by applying link-label and to design the method to be utilized for analysis of intermodal transportation networks. For the fist purpose, this paper takes advantage of the link-label technique in optimum path agent. For the second purpose, the link-mode transformation technique is adopted to treat all modes passing through the same link as each separate link-feature is generated.

- Main Track: Agents for Network Management | Pp. 496-505

A Channel Sounding Scheme of MIMO-OFDM System for Intelligent Area Network

Bang Hun Park; Juphil Cho; Heung Ki Baik; Jae Sang Cha

In this paper, we propose the Channel sounding scheme which is made for ideal communication between some application as well as the short distance of high speed data transmission in MIMO-OFDM system for Wireless PAN. This method is able to perceive the duration of the impulse response through the delaying of power delay profile, modeled a power delay profile which has an attenuate characteristic, and obtained the coefficient of channel response by ML (maximum likelihood). Through the amplitudes, phases and delays associated with each multipath component which were acquired from this Channel sounding scheme, we can describe the wave propagation characteristics of channels between the transmitter and receiver so that the receiver could enhance not only the reliability but also the ability of communication link.

- Main Track: Agents for Network Management | Pp. 506-511

Wireless Intelligent LBT Agents for Common Frequency Band Efficiency

Seong-Kweon Kim

This letter introduces the calculation method of common frequency bandwidth for frequency usage efficiency, when an intelligent Listen Before Talk (LBT) systems and non-intelligent frequency hopping (FH) systems coexist in the wireless communication network. The queuing theory is employed to model the FH and LBT system. The throughput for each channel was estimated by processing the frequency in use of channel and the interval of service time statistically.  Therefore, the common frequency bandwidth is calculated with the calculation multiplying the number of channel by the bandwidth per channel.

- Main Track: Agents for Network Management | Pp. 512-519