By Topic

Proceedings 5th International Symposium on Autonomous Decentralized Systems

26-28 March 2001

Filter Results

Displaying Results 1 - 25 of 65
  • Proceedings 5th International Symposium on Autonomous Decentralized Systems

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (380 KB)
    Freely Available from IEEE
  • Type-safe trading proxies using TORBA

    Publication Year: 2001, Page(s):303 - 310
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB) | HTML iconHTML

    Nowadays, autonomous distributed systems, such as large-scale telecom and manufacturing applications, rely on the use of middleware. In order to find back resources and to interconnect applications, the middleware has to provide a trading function. Unfortunately, standard traders such as the ODP/OMG CosTrading service, are error-prone due to the lack of type checking at compilation time, but only ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s):483 - 484
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Decentralized control of hybrid systems

    Publication Year: 2001, Page(s):287 - 294
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    The key issue of a multi agent system is the decentralized control and optimization of a given global system which is normally of large scale. In this connection features like stability, controllability, and observability are important aspects. The paper deals with control structures of decentralized agent driven hybrid systems. In addition some stability features of decentralized hybrid systems a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data protection in mobile agents; one-time key based approach

    Publication Year: 2001, Page(s):411 - 418
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    This paper deals with security issues in a mobile agent system, especially protecting agent data from malicious servers. For this purpose, a one-time key generation system, OKGS, is proposed. In OKGS, we integrate notions of a one-way hash function and a coupler. The one-way function plays a major role in ensuring confidentiality and integrity of agent data, and the notion of a coupler is used to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The new ATC system with an autonomous speed control with on-board equipment

    Publication Year: 2001, Page(s):235 - 238
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    The paper introduces a new digital ATC (automatic train control device) system developed by East Japan Railway Company (JR East). In the current ATC, the central ATC logic device calculates permissive speed of each blocking section and controls speed of all trains. On the other hand, in the new digital ATC, the central logic device calculates each position to which a train can move safely, and sen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile agent messaging models

    Publication Year: 2001, Page(s):278 - 286
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB) | HTML iconHTML

    It is not easy to make the decision of which messaging model to use in a mobile agent system. There are many different models to choose from and there are many forces influencing each model. We discuss five messaging models: Home-Proxy, Follower-Proxy, Email, Blackboard and Broadcast. We overview the forces that are the most important to all models and identify to what extent the forces influence ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A stabilizing search tree with availability properties

    Publication Year: 2001, Page(s):398 - 405
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB) | HTML iconHTML

    The ability of a system to recover from unexpected change in its environment or disruptions to its internal state is an indication of robust design and autonomous control. Recovery can be constrained by service availability requirements, so that even during periods of recovery, new service requests should be admitted and processed in a timely manner. Given that complex systems are constructed from... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Primary component asynchronous group membership as an instance of a generic agreement framework

    Publication Year: 2001, Page(s):93 - 100
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB) | HTML iconHTML

    Group-based computing is becoming more and more popular when one has to design middleware able to support reliable distributed applications. This paradigm is made of two basic services, namely, a group membership service and a group communication service. More generally, a group is a set of processes cooperating to carry out a common task (e.g., copies of a replicated server, participants in a tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concepts and architecture of a security-centric mobile agent server

    Publication Year: 2001, Page(s):435 - 442
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    Mobile software agents are software components that are able to move in a network. They are often considered as an attractive technology in electronic commerce applications. Although security concerns prevail. We describe the architecture and concepts of the SeMoA server-a runtime environment for Java-based mobile agents. Its architecture has a focus on security and easy extendability, and offers ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulating agent based processing in an ADS using C++ SIM

    Publication Year: 2001, Page(s):231 - 234
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Currently public networks have an enormous number of computers capable of providing many services. Autonomous mobile agents are being used to access their information sources. These agents are modeled in the context of network simulation as mobile network processes. The paper demonstrates that distributed mobile agents can be simulated effectively using C++ over CSIM. C++ over CSIM achieves the cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rule-driven coordination agents: a self-configurable agent architecture for distributed control

    Publication Year: 2001, Page(s):271 - 277
    Cited by:  Papers (1)  |  Patents (42)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    The need for coordination among autonomous entities is common in dynamically changing domains. One such domain is the coordination of components in distributed component architectures. In these architectures, asynchronous communication is used to ensure autonomy. Management systems that control such architectures must respect this autonomy by decentralizing interaction policies and control. Middle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of synthetic creativity through behavior modeling and simulation of an ant colony

    Publication Year: 2001, Page(s):391 - 397
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB) | HTML iconHTML

    The objective is to scientifically study the nature of creativity by modeling synthetic creativity in an ant colony, simulating it on a computer system, and measuring its impact on performance through innovative metric design. In this study, two synthetic creative traits are introduced into select individual ants of a colony by imparting to them a foraging behavior that is radically different from... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high assurance on-line recovery technology for a space on-board computer

    Publication Year: 2001, Page(s):47 - 56
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    A high-assurance online recovery technology for a space on-board computer that can be realized using commercial devices is proposed whereby a faulty processor node confirms its normality and then recovers without affecting the other processor nodes in operation. Also, the result of an evaluation test using the breadboard model (BBM) implementing this technology is reported. Because this technology... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assurance technologies for growing systems and their application to large-scale transport operation control systems

    Publication Year: 2001, Page(s):85 - 92
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    Recently, system needs of growing large-scale systems including heterogeneous functions and operations are increased. An assurance system that achieves high reliability and high availability is very important for such systems. In order to realize an assurance system, we developed the assurance technology based on ADS (Autonomous Decentralized System). When a growing large-scale system changes or g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconfigurable context-sensitive middleware for ADS applications in mobile ad hoc network environments

    Publication Year: 2001, Page(s):319 - 326
    Cited by:  Papers (13)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    The emergence of inexpensive and low-power wireless communication hardware and various handheld, wearable, and embedded computing technologies is making computing and communication devices more mobile and ubiquitous. Due to the mobility and high-density of network-enabled devices, short range mobile ad hoc networks (MANET) are instantaneously and autonomously formed to facilitate exchange of infor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reflective decision controls for autonomous distributed objects

    Publication Year: 2001, Page(s):212 - 219
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    We present a reflective decision control mechanism for dealing with synchronization and scheduling issues in a distributed computing environment. We present a component-based reflective architecture for assisting distributed objects in decision making. It enables autonomous entities to support reflective computation that requires a flexible means for managing the course of computation, resource al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal analysis of software security system architectures

    Publication Year: 2001, Page(s):426 - 434
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB) | HTML iconHTML

    We present an approach for analysis of security system architecture. Constraint patterns are introduced to formally specify the generic form of security policies that all implementations of the system architecture must enforce. The analysis is driven by incrementally decomposing a system-wide constraint pattern into a set of constraint patterns of constituent components. Since there are potentiall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile agents in network-centric warfare

    Publication Year: 2001, Page(s):243 - 246
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    This paper describes agent technology and the various ways in which it can be applied to command, control, communications and intelligence in general, and to network-centric warfare in particular. The paper provides a brief overview of agents, their properties, and their advantages. It covers the concept of the current military trend, network-centric warfare. Problems associated with agents are de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of algorithms for supporting disconnected write operations in mobile client-server environments

    Publication Year: 2001, Page(s):456 - 463
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    A mobile user may voluntarily disconnect itself from the Web server to save its battery life and avoid high communication prices. To allow Web pages to be updated while the mobile user is disconnected from the Web server, updates can be staged in the mobile unit and propagated back to the Web server upon reconnection. We analyze algorithms for supporting disconnected write operations and develop a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How agents from different e-commerce enterprises cooperate

    Publication Year: 2001, Page(s):341 - 348
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    Using agent technology to support e-commerce automation is a promising direction. However, previous “proof-of-concept” efforts do not scale well in e-commerce automation. An essential reason is that the conventional agent infrastructures are primarily designed for intra-enterprise, group-based agent cooperation, but most e-commerce applications are based on inter-enterprise business pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficiently announcing multimedia information from mobile computers with the WOR toolkit

    Publication Year: 2001, Page(s):227 - 230
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    We designed and built an information announcement basic software system that realizes a new using style, called the TAM. This style regards a mobile computer as a server as well as a client. In order to effectively announce information from a mobile computer as a server the system uses stationary computers, called SMHs, that manages mobile computers. The effectiveness of the system has been shown.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reactive Web agents with open constraint programming

    Publication Year: 2001, Page(s):251 - 254
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    This paper describes a new programming system for writing Web applications with reactive agents, i.e. the agents can have complex responses which depend on how the environment changes. Our prototype system is based on the open constraint programming framework using the constraint logic programming language CLP(R). The benefit of reactive Web agents is that activities of agents can be coordinated a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous navigation in information service systems for load balancing user demands

    Publication Year: 2001, Page(s):470 - 477
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB) | HTML iconHTML

    Autonomous information service system is a proposition made to cope with the continuously changing conditions of service provision and utilization in current information systems. The faded information field (FIF), sustained by Push/Pull mobile agent technology, is such a distributed architecture that brings high-assurance of the system through a balanced selective replication of the information. W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for developing reactive information agents with heterogeneous communication capabilities

    Publication Year: 2001, Page(s):263 - 270
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB) | HTML iconHTML

    We present a generic framework for developing complex distributed applications in open information environments, using reactive agents as basic building blocks. We address agent architecture and collaboration issues by introducing a minimal agent architecture, the Reactive Information Agent, and adopting a flexible asynchronous communication infrastructure, the Inter-Agent Communication Model. Fin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.