Scheduled System Maintenance
On Wednesday, July 26, IEEE Xplore will undergo scheduled maintenance from 1:00-3:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Proceedings. Fourth International Symposium on Autonomous Decentralized Systems. - Integration of Heterogeneous Systems -

23-23 March 1999

Filter Results

Displaying Results 1 - 25 of 62
  • Proceedings. Fourth International Symposium on Autonomous Decentralized Systems. - Integration of Heterogeneous Systems -

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (330 KB)
    Freely Available from IEEE
  • Information society - R&D challenges and opportunities

    Publication Year: 1999, Page(s):170 - 172
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (19 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Future directions for autonomous decentralized systems"

    Publication Year: 1999, Page(s):411 - 414
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (507 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Index of authors

    Publication Year: 1999, Page(s):425 - 426
    Request permission for commercial reuse | PDF file iconPDF (227 KB)
    Freely Available from IEEE
  • Migration transparency in agent systems

    Publication Year: 1999, Page(s):320 - 323
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    Migration distribution transparency is considered in the context of multi-agent systems. A mobile agent architecture is proposed with an availability service and a transparency interface. Transparent mobility of agents is explored in applications using overall balancing of resources. The search for a new destination agency follows a transparent location and selection. Final balancing takes place a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A mobile guide system for visually disabled persons

    Publication Year: 1999, Page(s):12 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    This paper presents a new mobile guide system for visually disabled persons. The system utilizes the latest technologies such as data-carriers, mobile communication and portable computers. Data-carriers are embedded at many places in the station such as floors, platforms and walls. Coded data recorded in data-carriers are transferred to users via a reader installed in the name of the user. The dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security server incorporating relay servers for distributed processing environments

    Publication Year: 1999, Page(s):246 - 251
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    A method is proposed that uses a security server to assure more secure communication without degrading the performance on the distributed object-oriented network architecture in the distributed processing environment (DONA-DPE). Security in communications is enhanced when the number of communication exchanges is minimized. To accomplish this, in the proposed model the security server incorporates ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-agent reinforcement learning for crane control problem: designing rewards for conflict resolution

    Publication Year: 1999, Page(s):310 - 317
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    In recent years, a reinforcement learning approach to build an agent's knowledge in a multi-agent world has prevailed when the reinforcement learning is applied to such a world, “a concurrent learning among the agents”, “a perceptual aliasing”, and “a designing rewards” are the most important problems to be considered. We have already confirmed that profit-shari... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineering look-ahead in distributed conversations

    Publication Year: 1999, Page(s):142 - 149
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    This paper investigates the effects of relaxing the synchronisation embedded in “classical” conversation schemes. Look-ahead conversation scheme enables the synchronisation mandated by conversations to be performed concurrently to other normal system activities, and thereby provides scope for enhancing system performance. In this paper, we take the view that permitting look-ahead must ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure and open mobile agent programming environment

    Publication Year: 1999, Page(s):238 - 245
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    The Mobile Agent technology is suitable for applications in open, distributed and heterogeneous environments such as the Internet and the Web, because it can overcome some limits of traditional approaches. The paper describes a Secure and Open Mobile Agent (SOMA) programming environment with two main design objectives that are security and interoperability. On the one hand SOMA is based on a thoro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing the TINA retailer reference point

    Publication Year: 1999, Page(s):268 - 275
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    This paper shows that testing open object-based distributed systems is, in principle, feasible by applying the ISO/ITU-T conformance testing methodology framework. In this context, a gap in the (semi-) automatic test development and execution process has been identified and bridged. We have developed an approach to the application of the standardized test notation TTCN for testing ODL-based implem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the concept of “stability” in asynchronous distributed decision-making systems

    Publication Year: 1999, Page(s):302 - 309
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    Asynchronous distributed, decision-making (ADDM) systems constitute a special class of distributed problems and are characterized as large, complex, real-world systems wherein the principal elements are the geographically-dispersed entities that communicate among themselves, asynchronously, through message passing and are permitted autonomy in local decision-making. Such systems generally offer si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Working Set in channel management for cellular networks

    Publication Year: 1999, Page(s):116 - 123
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    Channel resource management (e.g., allocation and borrowing) is a critical aspect of wireless cellular networks. Since channel borrowing is an expensive task, incurring long delay, a key design goal of efficient channel resource management is to minimize the total number of channel borrowing operations. This paper focuses on the `Quantum' issue (number of channels) in the channel borrowing and rel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamical distributed memory systems

    Publication Year: 1999, Page(s):374 - 377
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    We propose an autonomous dynamical pattern recognition and learning system. It is demonstrated that when the embedded pattern, i.e., known pattern, is given to the network, the firing pattern of the network immediately goes to the relevant embedded pattern and the network state reduces to the oscillatory state at once. Second, when no embedded pattern, i.e., unknown pattern, is given to the networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed approach to computer virus detection and neutralization by autonomous and heterogeneous agents

    Publication Year: 1999, Page(s):328 - 331
    Cited by:  Papers (7)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    Recent expansion of the computer network opened a possibility of explosive spread of computer viruses. We propose a distributed approach against computer virus using also the computer network that allows distributed and agent-based approach. Our anti-virus system consists of several heterogeneous agents similarly to the immune system. Among these agents, antibody agents use the information of &ldq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for a 4th generation messaging system

    Publication Year: 1999, Page(s):158 - 167
    Cited by:  Papers (4)  |  Patents (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    A variety of concepts for service integration and corresponding service platforms emerged in the last two years. On the one hand, they aim for the interworking and integration of classical telecommunication and data communication services, such as telephony, voicemail, fax, e-mail, paging, etc. On the other hand they focus on universal service access from a variety of end user systems, including b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the use of COTS microkernels for dependable systems

    Publication Year: 1999, Page(s):132 - 139
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    This paper addresses the problem of using COTS microkernels for the design and implementation of dependable systems. Although not designed to deal with faulty situation, their analysis in the presence of faults is of high interest since all upper layers rely on their correct behavior. Such an information can be used to design upper layers accordingly. However, as shown in many works, the results o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure key registration system based on proactive secret-sharing scheme

    Publication Year: 1999, Page(s):230 - 237
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t, n)-threshold scheme, which means that the data can be recovered if t sewers cooperate (in other words, that the data cannot be revealed unless t sewers collude). The proactive scheme provides stronger security against a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous agents for online diagnosis of a safety-critical system based on probabilistic causal reasoning

    Publication Year: 1999, Page(s):213 - 219
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    The goal of decentralization in failure detection, identification, and recovery of high-assurance systems is to focus diagnosis on safety-critical components. The goal of probabilistic causal reasoning in diagnosis is to improve performance of fault isolation, However, this reasoning method is dependent on prior reliability knowledge. Our approach aims at focusing the overall diagnostic cycle in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agents and autonomous distributed systems

    Publication Year: 1999, Page(s):264 - 266
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    An Autonomous Distributed System (ADS) is a collection of autonomous entities, which realize a given function through mutual interactions. This concept of ADS allows the development of systems, which involves a large number of independent entities and dynamically changing structure to meet the evolving user requirements. Agents are characterised by the concepts of situatedness, flexibility and aut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Future directions for autonomous decentralized systems

    Publication Year: 1999, Page(s):400 - 401
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of a legacy application into a TINA retailer environment

    Publication Year: 1999, Page(s):198 - 204
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    Providers of telecommunications services will have a need in the future to integrate a variety of applications into their service portfolios. This paper describes experiences gained in integrating an existing application with telecommunications service management to present it as a telecommunications service. It further reports on the offering of such a service within a multi-retailer environment,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile agents in autonomous decentralized systems

    Publication Year: 1999, Page(s):258 - 260
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (28 KB)

    In the last years mobile agents have gained much attention in the industry and academic community. Many prototype systems and some products providing mobile agent capability have been developed and mobile agents have been proposed for being used in a set of application areas, such as electronic commerce, workflow systems, network management, among others. In the last years we also experienced an e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emergence of communication for negotiation by a recurrent neural network

    Publication Year: 1999, Page(s):294 - 301
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    We believe that communication in multi-agent system has two major meanings. One of them is to transmit one agent's observed information to the other. The other meaning is to transmit what an agent is thinking. Here we focus the latter and aim to the emergence of the autonomous and decentralized arbitration communication among some agents. Communication contents, strategy and representation are not... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced train administration and communication system based on ADS technologies

    Publication Year: 1999, Page(s):388 - 391
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    Conventional train control is performed in the following manner. Train location is detected by wayside signaling facilities, and according to train location, train control signals are indicated to prevent crashes between trains. However, this control requires enormous number of facilities, that means large amount installation and maintenance expenditures. Recent remarkable progress in the field of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.