Catálogo de publicaciones - libros

Compartir en
redes sociales


Agent Computing and Multi-Agent Systems: 9th Pacific Rim International Workshop on Multi-Agents, PRIMA 2006, Guilin, China, August 7-8, 2006, Proceedings

Zhong-Zhi Shi ; Ramakoti Sadananda (eds.)

En conferencia: 9º Pacific Rim International Workshop on Multi-Agents (PRIMA) . Guilin, China . August 7, 2006 - August 8, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Artificial Intelligence (incl. Robotics); Computer Communication Networks; Software Engineering; Logics and Meanings of Programs

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-36707-9

ISBN electrónico

978-3-540-36860-1

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

AgentAssembly: The Agent Framework Platform

Ockmer L. Oosthuizen; E. M. Ehlers

This paper discusses the AgentAssebly architecture and specifically the agent framework platform component of the architecture. An introduction is given to the work covered in the paper and previous work (see [1]) this paper is based upon. Then an in-depth discussion is rendered on the agent framework platform provided by the AgentAssembly architecture. The paper concludes with some remarks on the research presented and future aims of the ongoing research project.

- Short Papers | Pp. 760-765

A Multi-agent Architecture for CSCW Systems: From Organizational Semiotics Perspective

Wenge Rong; Kecheng Liu

This paper describes a multi-agent architecture to support CSCW systems modelling. Since CSCW involves different organizations, it can be seen as a social model. From this point of view, we investigate the possibility of modelling CSCW by agent technology, and then based on organizational semiotics method a multi-agent architecture is proposed via using EDA agent model. We explain the components of this multi-agent architecture and design process. It is argued that this approach provides a new perspective for modelling CSCW systems.

- Short Papers | Pp. 766-772

Knowledge Description Model for MAS Utilizing Distributed Ontology Repositories

Kyengwhan Jee; Jung-Jin Yang

The rapid growth of IT technologies enables the quality of human’s daily life to be improved dramatically. Contrasting to the services in previous computing environment directed by user’s request, the services in ubiquitous computing era of new IT technology are provided through recognizing user’s intention and utilizing context-aware information suited to the user. According to the contextual information, agents need to set a dynamic goal to achieve and work collaboratively with other agents. Agents that take control over their behaviors with capability of communicating with other agents become a thrust in this up-coming computing environment. This work focuses on building ontologies, shared knowledge bases among agents, to improve semantical interoperability among agents. More attention is given to the construction and effective management of ontology repository along with its requirement and organization. Ontology agent suggested takes an initiative role to manage the repository in a distributed manner and to facilitate the use of ontology in a multi-agent environment.

- Short Papers | Pp. 773-780

Object Recognition Using K-Nearest Neighbor in Object Space

Jong-Min Kim; Jin-Kyoung Heo; Hwan-Seok Yang; Mang-Kyu Song; Seung-Kyu Park; Woong-Ki Lee

Object recognition technologies using PCA(principal component analysis) recognize objects by deciding representative features of objects in the model image, extracting feature vectors from objects in an image and measuring the distance between them and object representation. Given frequent recognition problems associated with the use of point-to-point distance approach, this study adopted the K-nearest neighbor technique(class-to-class) in which a group of object models of the same class is used as recognition unit for the images inputted on a continual input image. However, we propose the object recognition technique new PCA analysis method that discriminates an object in database even in the case that the variation of illumination in training images exists. Object recognition algorithm proposed here represents more enhanced recognition rate to change of illumination than existing methods.

- Short Papers | Pp. 781-786

Research on Smart Multi-agent Middleware for RFID-Based Ubiquitous Computing Environment

Minwoo Son; Joonhyung Kim; Dongil Shin; Dongkyoo Shin

Previous RFID (Radio Frequency IDentification) middleware did not include intelligent capabilities such as automatically controlling home appliances and users. Therefore, we add USN (Ubiquitous Sensor Network) technology, which recognizes and manages an appliance’s state-information (temperature, humidity, pollution and so on) by connecting RFID tags, and propose the Smart Multi-Agent Middleware architecture for intelligently managing the RFID-based ubiquitous computing environment. We also present the proposed architecture’s execution procedure for controlling ubiquitous appliances.

- Short Papers | Pp. 787-792

Certificate Management System in MANET for Ubiquitous Computing

Dae-Young Lee; Sang-Hyun Bae

This study addressed security requirements for ad-hoc network environments, which lies at the heart of the ubiquitous computing revolution and proposed a partially-distributed certificate management system that can ensure security in mobile ad-hoc networks. The proposed model is characterized by its ability to handle dynamic mobility of nodes, minimize routing load and enhance expandability of network by allowing participating nodes to authenticate each other without being interrupted by joining the cluster. The security, efficiency and robustness of the proposed model were evaluated through simulation.

- Short Papers | Pp. 793-800

FPGA Based Intrusion Detection System Against Unknown and Known Attacks

Dong-Ho Kang; Byoung-Koo Kim; Jin-Tae Oh; Taek-Yong Nam; Jong-Soo Jang

Network intrusion detection systems often rely on matching patterns that are gleaned from known attacks. While this method is reliable and rarely produces false alarms, it has the obvious disadvantage that it cannot detect novel attacks. Accordingly, an alternative approach which can be a combination with pattern matching approach is needed. We have made effort to design and implement high speed protocol anomaly and signature based intrusion detection approach to detect known and unknown attacks. This approach extracts a set of service fields from the application payload where many attacks occur and analyzes the value of fields to verify attack. This approach is implemented on the FPGA (Xilinx Virtex II pro) device to process packet at gigabit-per-second data rates.

- Short Papers | Pp. 801-806

Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks

Jun-Cheol Jeon; Eun-Yeung Choi; Kee-Young Yoo

The current paper proposes a network-based Intrusion Detection System (IDS) that can efficiently detect attacks based on malformed packets that continues to increase, along with more intelligent and skillful hacking techniques. Our system firstly extracts the important features from network packets and analyzes simple attacks and detects IP fragmentation attacks. Thereafter, it collects information from the SA and the FA and other strange information related to the malformed packet. Finally, it judges whether or not an intrusion has occurred on the basis of information gathered from target systems by CAs. The simulation result shows 0% false-positive and 0% false-negative, 100% detection ratio, thereby confirming the accuracy of the proposed IDS in detecting fragmentation attacks.

- Short Papers | Pp. 807-812

Efficient Mutual Authentication Scheme with Smart Card

Eun-Jun Yoon; Kee-Young Yoo

In 2006, both Liu et al. and Yeh proposed an improvement of Chien et al.’s timestamp-based remote user authentication scheme with smart cards, that can withstand parallel session and forgery attacks, respectively. The current paper demonstrates that Liu et al.’s scheme is still vulnerable to a masquerading server attack and a more efficient and secure scheme is needed. One that not only resolves such problems, but also involves less computations and communication than these schemes.

- Short Papers | Pp. 813-818

Strong Mobility for FIPA Compliant Multi-agent Systems

Javed Iqbal; H. Farooq Ahmad; Arshad Ali; Hiroki Suguri; Sarmad Sadik

In recent years popularity of Mobile-Agent systems makes it one of the promising technologies for developing intelligent software systems. The most important issues in the Mobile-Agent system are the migration of agent which can be categorized as Strong or weak. Strong mobility allows the agents to migrate without loss of execution state at any time, a powerful mechanism for implementing peer-to-peer computing environment. We have designed and implemented a strong mobility framework for SAGE (Scalable Fault Tolerant Agent Grooming Environment). Our key objective is to offer efficient and reliable infrastructure for agent’s strong mobility. We have performed a number of experiments to quantitatively evaluate the effectiveness and efficiency of our proposed architecture.

- Short Papers | Pp. 819-824