By Topic

IEEE/WIC/ACM International Conference on Intelligent Agent Technology

Date 19-22 Sept. 2005

Filter Results

Displaying Results 1 - 25 of 146
  • Proceedings. The 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • IEEE/WIC/ACM International Conference on Intelligent Agent Technology - Title Page

    Publication Year: 2005, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • IEEE/WIC/ACM International Conference on Intelligent Agent Technology - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • IEEE/WIC/ACM International Conference on Intelligent Agent Technology - Table of contents

    Publication Year: 2005, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (230 KB)
    Freely Available from IEEE
  • Welcome Message from Conference Chairs and Program Chair

    Publication Year: 2005, Page(s):xv - xx
    Request permission for commercial reuse | PDF file iconPDF (159 KB) | HTML iconHTML
    Freely Available from IEEE
  • IAT’05 and WI’05 Conference Organization

    Publication Year: 2005, Page(s):xxi - xxii
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Program Committees

    Publication Year: 2005, Page(s):xxiii - xxix
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • IAT’05 Non-PC Reviewers

    Publication Year: 2005, Page(s): xxx
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Opportunities from open source search

    Publication Year: 2005, Page(s):2 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Internet search has a strong business model that permits a free service to users, so it is difficult to see why, if at all, there should be open source offerings as well. This paper first discusses open source search, and a rationale for the computer science community at large to get involved. Because there is no shortage of core open source components for at least some of the tasks involved, the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge representation and unmanned aerial vehicles

    Publication Year: 2005, Page(s):9 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    Knowledge representation technologies play a fundamental role in any autonomous system that includes deliberative capability and that internalizes models of its internal and external environments. Integrating both high- and low-end autonomous functionality seamlessly in autonomous architectures is currently one of the major open problems in robotics research. UAVs offer especially difficult challe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agreement technologies

    Publication Year: 2005
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (53 KB) | HTML iconHTML

    Summary form only given. Computer systems in which autonomous software agents negotiate with one another in order to come to mutually acceptable agreements are fast becoming commonplace in a wide range of networked systems (e.g., in the semantic Web, grid computing, pervasive computing and peer-to-peer systems). In such systems, agents are required to participate in a range of negotiation scenario... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive architecture for physical agents

    Publication Year: 2005, Page(s):18 - 25
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    In this paper we describe ICARUS, an adaptive architecture for intelligent physical agents. We contrast the framework's assumptions with those of earlier architectures, taking examples from an in-city driving task to illustrate our points. Key differences include primacy of perception and action over problem solving, separate memories for categories and skills, a hierarchical organization on both ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing expert advice by analogy for on-line help

    Publication Year: 2005, Page(s):26 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    One of the principal problems of online help is the mismatch between the specialized knowledge and technical vocabulary of experts who are providing the help, and the relative naivete of novices, who usually are often not in a position to understand solutions expressed by the expert in their own terms. Most of the interfaces are plagued by recurrent key problems: 1) elicitation - how to ask questi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution in simple systems and the emergence of complexity

    Publication Year: 2005, Page(s):33 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Evolution, understood as the powerful interplay of reproduction, variation, and selection, represents an excellent tool for optimization in populations of simple and complex entities even under conditions where only limited information is available. The principle underlying this optimization heuristic was discovered and formulated already by Charles Darwin. In biology variation and selection opera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A compact multiagent system based on autonomy oriented computing

    Publication Year: 2005, Page(s):38 - 44
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    A compact multiagent optimization system (MAOSC) based on autonomy oriented computing (AOC) is presented. Performed by a society of autonomous entities in iterative cycles, an optimization algorithm can simply be described by a macro generate-and-test behavior, which deploys a few elemental generating behaviors under conditioned reflex behaviors supported by a testing operation library.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic determination of the itinerary of mobile agents with timing constraints

    Publication Year: 2005, Page(s):45 - 50
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    The mobile agent technology is an important research area in the scope of code mobility. As part of an agent mission objective, it may exist the necessity of meeting an end-to-end deadline, although with some flexibility about the itinerary the agent should follow. The objective of this paper is to define an execution model for mobile agents that include timing constraints. We also show some simpl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic lightpath protection in WDM optical networks using ant-based mobile agents

    Publication Year: 2005, Page(s):51 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    In this paper, we consider the problem of dynamic lightpath protection in survivable WDM networks with single link failure model. Our work concerns in how to dynamically determine a protection cycle to establish a dependable lightpath with fault-tolerance requirement. This problem is identified as NP-complete, thus a heuristic for finding near optimal solution with reasonable computation time is u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An internal agent architecture incorporating standard reasoning components and standards-based agent communication

    Publication Year: 2005, Page(s):58 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    This paper discusses a general architecture for intelligent software agents. It can be used to construct agents that engage in high-level reasoning by employing standard reasoning engines as plug-in components, while communicating with other agents by means of the standard FIPA-based communication protocols. The approach discussed uses internal micro-agents and declarative goals to form a hierarch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A personality-based model of agents for representing individuals in working organizations

    Publication Year: 2005, Page(s):65 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    This paper proposes an agent architecture which can be used to represent individuals within a working organization. The proposed architecture has been based on the theory of human personality and its working relationship from Theodore Milton. The main aim of this paper is to describe a suitable representation of individual behaviors which is able to be mapped to collective patterns of a human orga... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using ODML to model multi-agent organizations

    Publication Year: 2005, Page(s):72 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    In this paper, we introduce a domain-independent organizational design representation able to model and predict the quantitative performance characteristics of agent organizations. This representation, capable of capturing a wide range of multi-agent behaviors, can support the selection of an appropriate design given a particular operational context. We demonstrate the capabilities and efficacy of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the use of hierarchical power-law network topology for server selection and allocation in multi-agent systems

    Publication Year: 2005, Page(s):81 - 87
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    In this paper, we focus on the effectiveness of using the power-law relationship that appears in actual network topology for solving server selection and allocation problems in multi-agent systems (MAS). We introduce the reverse weighted degree (RWD) server selection algorithm, which selects the nearest server with a lower load average, and the concept of the scope, which spreads the range of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A mobile autonomous agent-based secure payment protocol supporting multiple payments

    Publication Year: 2005, Page(s):88 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    In agent based e-commerce applications, it is challengable to employ one mobile agent to complete all transactions including payments due to the security consideration. In this paper, we propose a new agent-assisted secure payment protocol, which is based on SET payment protocol and aims at enabling one dispatched consumer-agent to autonomously complete the payment on behalf of the cardholder with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Goal-oriented methodology for agent system development

    Publication Year: 2005, Page(s):95 - 101
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    The goal-orientation is one of the key features in agent system. This paper proposes a new methodology for multi-agent system development based on goal net model. The methodology covers the whole life cycle of the agent system development, from requirement analysis, architecture design, and detailed design to implementation. A multi-agent development environment (MADE) that facilitates the design ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On different trust attitudes and their effects on the electronic marketplace

    Publication Year: 2005, Page(s):102 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Conducting business on the Internet poses many risks and involves making trusting decisions. Software agents reflecting the preferences of their users have different trust attitudes and can therefore make different trusting choices. We present the results of a simulation for a market scenario in which buyers and sellers are not always fully committed to the market's protocol. Our interest is in th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and simulating the dynamics of service agent networks

    Publication Year: 2005, Page(s):109 - 115
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    The dynamic interactions within a social network can be modeled with respect to service transactions. In this paper, we develop a framework for modeling a service agent network in an attempt to study the emergent dynamic behavior (e.g., performance and formation) of the network. In the framework, a service transaction process is introduced that is composed of such steps as service matching, servic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.