Catálogo de publicaciones - libros
Agent and Multi-Agent Systems: Technologies and Applications: First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31 - June 1, 2007. Proceedings
Ngoc Thanh Nguyen ; Adam Grzech ; Robert J. Howlett ; Lakhmi C. Jain (eds.)
En conferencia: 1º KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA) . Wrocław, Poland . May 31, 2007 - June 1, 2007
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Artificial Intelligence (incl. Robotics); Information Systems Applications (incl. Internet); Data Mining and Knowledge Discovery; Computer Appl. in Administrative Data Processing; User Interfaces and Human Computer Interaction; Computers and Society
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-72829-0
ISBN electrónico
978-3-540-72830-6
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2007
Tabla de contenidos
A Model for Informed Negotiating Agents
John Debenham; Simeon Simoff
We propose that the key to building intelligent negotiating agents is to take an agent’s historic observations as primitive, to model that agent’s changing uncertainty in that information, and to use that model as the foundation for the agent’s reasoning. We describe an agent architecture, with an attendant theory, that is based on that model. In this approach, the utility of contracts, and the trust and reliability of a trading partner are intermediate concepts that an agent may estimate from its information model. This enables us to describe intelligent agents that are not necessarily utility optimisers, that value information as a commodity, and that build relationships with other agents through the trusted exchange of information as well as contracts.
- Main Track: Negotiating Agents | Pp. 426-435
Power in Norm Negotiation
Guido Boella; Leendert van der Torre
In social mechanism design, norm negotiation creates individual or contractual obligations fulfilling goals of the agents. The social delegation cycle distinguishes among social goal negotiation, obligation and sanction negotiation and norm acceptance. Power may affect norm negotiation in various ways, and we therefore introduce a new formalization of the social delegation cycle based on power and dependence, without referring to the rule structure of norms, actions, decision variables, tasks, and so on.
- Main Track: Negotiating Agents | Pp. 436-446
Quantitative Analysis of Single-Level Single-Mediator Multi-agent Systems
Moon Ho Lee; Aliaksandr Birukou; Alexander Dudin; Valentina Klimenok; Chang-hui Choe
Queueing Theory deals with problems where some restricted resource should be shared between competitive flow of requests. In this paper we use Queueing Theory methods to perform a quantitative analysis of a single-level single-mediator multi-agent system. In the system, several agents, coordinated by the mediator process user queries. We adopt matrix analytic methods to compute performance characteristics in terms of a queueing network of tree-like topology with cooperation of the servers. Results can be used for the logical and technical design and optimal resources sharing in multi-agent systems.
- Main Track: Negotiating Agents | Pp. 447-455
Software Agent Negotiation for Service Composition
Claudia Di Napoli
Service–oriented computing (SOC) is posing new challenges in the management of compositions of services that usually belong to different administrative domains. As such they cannot be provided by adopting a centralized approach, but more sophisticated computing methodologies are necessary.
In this paper we propose to use software agent negotiation to address the problem of composing services in service–oriented environments, like the Grid. In particular, we propose to use software agents to represent service providers and service consumers, and a negotiation protocol to select the service providers that meet the requirements of service consumers on the provision of multiple interconnected services.
The proposed protocol is thought as a protocol to improve the possibility of reaching an agreement by allowing both service consumers and providers to exchange more proposals to accommodate the dynamic and changing nature of service–oriented environments.
- Main Track: Negotiating Agents | Pp. 456-465
A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture
Eduardo Mosqueira-Rey; Amparo Alonso-Betanzos; Belen Baldonedo del Río; Jesús Lago Piñeiro
We describe the design of a misuse detection agent, one of the different agents in a multiagent-based intrusion detection system. This system is being implemented in JADE, a well-known multiagent platform based in Java. The agent analyzes the packets in the network connections using a packet sniffer and then creates a data model based on the information obtained. This data model is the input to a rule-based agent inference engine, which uses the Rete algorithm for pattern matching, and the rules of the signature-based intrusion detection system Snort. Specifically, an implementation in Java language – the Drools-JBoss Rules– was used, and a parser was implemented that converts Snort rules to Drools rules. The use of object-oriented techniques, together with design patterns, means that the agent is flexible, easily configurable and extensible.
- Main Track: Agents for Network Management | Pp. 466-475
An Agent System for Bandwidth Allocation in Reservation-Based Networks Using Evolutionary Computing and Vickrey Auctions
Ángel M. Pérez-Bellido; Sancho Salcedo-Sanz; José A. Portilla-Figueras; Emilio G. Ortíz-García; Pilar García-Díaz
This paper presents an agent system for bandwidth allocation in reservation-based networks, using Vickrey auctions and an evolutionary algorithm. Our evolutionary approach performs the bandwidth allocation to agents which bid for networks resources by means of willingness-to-pay functions. It also calculates in a parallel way the price to be paid to the network’s owner. We tackle the case of one-link, and its extension to a network. Simulations performed have shown the main advantages and problems inherent to this model
- Main Track: Agents for Network Management | Pp. 476-485
Multiagent Approach to Network Traffic Anomalies Uncertainty Level Assessment in Distributed Intrusion Detection System
Grzegorz Kołaczek
The paper proposes a formal framework for network traffic anomalies uncertainty level assessment within a distributed multiagent Intusion Detection System (IDS) architecture. The role of traffic anomalies detection is discussed then it has been clarified how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading). Finally, it has been defined how to use the proposed techniques in distributed IDS.
- Main Track: Agents for Network Management | Pp. 486-495
An Algorithm for Loopless Optimum Paths Finding Agent System and Its Application to Multimodal Public Transit Network
Doohee Nam; Seongil Shin; Changho Choi; Yongtaek Lim; Seung Jae Lee
The entire path deletion methods (EPDM) explore the K-th network transformation in order to prevent the predetermined K-1 number of path(s) from being re-searched in optimum path finding agent system. But, they show a critical drawback for the application in practical traffic network because loops, in which the same node and link are reappeared without limitation, can’t be constrained. The purpose of this paper is to develop a method to selectively control loop-paths by applying link-label and to design the method to be utilized for analysis of intermodal transportation networks. For the fist purpose, this paper takes advantage of the link-label technique in optimum path agent. For the second purpose, the link-mode transformation technique is adopted to treat all modes passing through the same link as each separate link-feature is generated.
- Main Track: Agents for Network Management | Pp. 496-505
A Channel Sounding Scheme of MIMO-OFDM System for Intelligent Area Network
Bang Hun Park; Juphil Cho; Heung Ki Baik; Jae Sang Cha
In this paper, we propose the Channel sounding scheme which is made for ideal communication between some application as well as the short distance of high speed data transmission in MIMO-OFDM system for Wireless PAN. This method is able to perceive the duration of the impulse response through the delaying of power delay profile, modeled a power delay profile which has an attenuate characteristic, and obtained the coefficient of channel response by ML (maximum likelihood). Through the amplitudes, phases and delays associated with each multipath component which were acquired from this Channel sounding scheme, we can describe the wave propagation characteristics of channels between the transmitter and receiver so that the receiver could enhance not only the reliability but also the ability of communication link.
- Main Track: Agents for Network Management | Pp. 506-511
Wireless Intelligent LBT Agents for Common Frequency Band Efficiency
Seong-Kweon Kim
This letter introduces the calculation method of common frequency bandwidth for frequency usage efficiency, when an intelligent Listen Before Talk (LBT) systems and non-intelligent frequency hopping (FH) systems coexist in the wireless communication network. The queuing theory is employed to model the FH and LBT system. The throughput for each channel was estimated by processing the frequency in use of channel and the interval of service time statistically. Therefore, the common frequency bandwidth is calculated with the calculation multiplying the number of channel by the bandwidth per channel.
- Main Track: Agents for Network Management | Pp. 512-519