Proceedings 5th International Symposium on Autonomous Decentralized Systems

26-28 March 2001

Filter Results

Displaying Results 1 - 25 of 65
  • Proceedings 5th International Symposium on Autonomous Decentralized Systems

    Publication Year: 2001
    Request permission for commercial reuse | |PDF file iconPDF (380 KB)
    Freely Available from IEEE
  • Type-safe trading proxies using TORBA

    Publication Year: 2001, Page(s):303 - 310
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (724 KB) | HTML iconHTML

    Nowadays, autonomous distributed systems, such as large-scale telecom and manufacturing applications, rely on the use of middleware. In order to find back resources and to interconnect applications, the middleware has to provide a trading function. Unfortunately, standard traders such as the ODP/OMG CosTrading service, are error-prone due to the lack of type checking at compilation time, but only ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s):483 - 484
    Request permission for commercial reuse | |PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • TMOES: a CORBA service middleware enabling high-level real-time object programming

    Publication Year: 2001, Page(s):327 - 335
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (696 KB) | HTML iconHTML

    Extending the CORBA programming and execution environments to support real-time distributed applications is a subject of growing interest to both research and industry. The time-triggered message triggered object (TMO) programming scheme has been established to remove the severe limitations of conventional object structuring techniques in developing real-time distributed applications. To facilitat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous navigation in information service systems for load balancing user demands

    Publication Year: 2001, Page(s):470 - 477
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (620 KB) | HTML iconHTML

    Autonomous information service system is a proposition made to cope with the continuously changing conditions of service provision and utilization in current information systems. The faded information field (FIF), sustained by Push/Pull mobile agent technology, is such a distributed architecture that brings high-assurance of the system through a balanced selective replication of the information. W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconfigurable context-sensitive middleware for ADS applications in mobile ad hoc network environments

    Publication Year: 2001, Page(s):319 - 326
    Cited by:  Papers (13)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (584 KB) | HTML iconHTML

    The emergence of inexpensive and low-power wireless communication hardware and various handheld, wearable, and embedded computing technologies is making computing and communication devices more mobile and ubiquitous. Due to the mobility and high-density of network-enabled devices, short range mobile ad hoc networks (MANET) are instantaneously and autonomously formed to facilitate exchange of infor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GDEVS: a generalized discrete event specification for accurate modeling of dynamic systems

    Publication Year: 2001, Page(s):464 - 469
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (352 KB) | HTML iconHTML

    Given a process whose output is a dynamic function of time, the traditional discrete event specification (DEVS) approximates the input, output, and state trajectories through piecewise constant segments, where the segments correspond to discrete time intervals that are not necessarily equal in length. For processes that defy accurate modeling through piecewise constant segments, this paper present... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An automated client-driven approach to data extraction using an autonomous decentralized architecture

    Publication Year: 2001, Page(s):311 - 318
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (556 KB) | HTML iconHTML

    Over recent years, “Internet-able” applications and architectures have been used to support domains where there are multiple interconnected systems that are both decentralized and autonomous. One such domain is the support of data management at the enterprise level. Typically, in these domains, both the schema of the data repository and the individual query needs of the users evolve ov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-based electronic commerce: opportunities and challenges

    Publication Year: 2001, Page(s):146 - 148
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (192 KB) | HTML iconHTML

    A trading agent that closely models the strategies and preferences of the person or business it represents should consider many possibilities for a single transaction. How these parallel negotiations occur will be a matter of strategy, processing power, governing policies and an agent's ability to manage complexity. An agent may even consider the things already owned by the buyer, other needs outs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Godefroid's state-less search technique for testing concurrent programs

    Publication Year: 2001, Page(s):77 - 84
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (676 KB) | HTML iconHTML

    P. Godefroid (1997) developed a state-space exploration technique that does not store states in memory. This stateless search technique is effective for testing concurrent programs. It performs deterministic executions of a concurrent program by automatically controlling the execution of synchronization operations. This technique also uses partial order reduction methods to reduce the chance of ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service matching and collaboration for electronic commerce

    Publication Year: 2001, Page(s):169 - 175
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (480 KB) | HTML iconHTML

    We propose a software architecture for one-stop services of electronic commerce (EC). Users currently have trouble using multiple EC services because they are provided independently. Therefore a mediator that combines EC services and provides one-stop services to users would be useful. Service matching and service collaboration are important issues in the mediator because they are the main difficu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating autonomous enterprise systems through dependable CORBA objects

    Publication Year: 2001, Page(s):204 - 211
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (644 KB) | HTML iconHTML

    Integrating autonomous enterprise systems allows the cooperation among applications belonging to distinct systems. As an example, this problem shows up when integrating software services of large departments and organizations in e-government initiatives. This paper studies, in the context of the Unitary Network of the Italian Public Administration, the problem of increasing the availability of ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of algorithms for supporting disconnected write operations in mobile client-server environments

    Publication Year: 2001, Page(s):456 - 463
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (680 KB) | HTML iconHTML

    A mobile user may voluntarily disconnect itself from the Web server to save its battery life and avoid high communication prices. To allow Web pages to be updated while the mobile user is disconnected from the Web server, updates can be staged in the mobile unit and propagated back to the Web server upon reconnection. We analyze algorithms for supporting disconnected write operations and develop a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-based auctions

    Publication Year: 2001, Page(s):144 - 145
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (172 KB) | HTML iconHTML

    The article discusses the technical challenges, business implications and research issues of agent based auctions. Electronic auctions are formalized communication procedures in which the traders' interaction is governed by specific auction rules (S. Klein, 1997). Usually, the auctioneer functions as an intermediary or agent for the sellers, but this does not have to be the case. The auction rules... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access revocation and prevention of false repudiation in secure email exchanges

    Publication Year: 2001, Page(s):419 - 425
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (484 KB) | HTML iconHTML

    A secure email protocol (SEP) is introduced to provide a decentralized means of revoking trust access and preventing false repudiation. Verification of the exchange of a message between sender and recipient is accomplished through an identification cookie (IC) and an encryption key (EK) handled by Verification and Authentication Agents (VAAs). The communicated narrative is encrypted by the EK. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Brokering based self organizing e-service communities

    Publication Year: 2001, Page(s):349 - 356
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (592 KB) | HTML iconHTML

    The rapid evolution of the Internet and its business tools is enabling the transformation and deployment of business processes as highly modular e-services that can be flexibly and dynamically composed to form ad-hoc workflow. This research prepares for the proliferation of automated, Internet-based workflow, by contributing a suite of protocols for self-organizing brokering communities that enabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Primary component asynchronous group membership as an instance of a generic agreement framework

    Publication Year: 2001, Page(s):93 - 100
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (596 KB) | HTML iconHTML

    Group-based computing is becoming more and more popular when one has to design middleware able to support reliable distributed applications. This paradigm is made of two basic services, namely, a group membership service and a group communication service. More generally, a group is a set of processes cooperating to carry out a common task (e.g., copies of a replicated server, participants in a tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location transparent distributed scripts and their execution system on D'Agent

    Publication Year: 2001, Page(s):223 - 226
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (272 KB) | HTML iconHTML

    Ease of programming is the main merit of script languages. In distributed computing environments, programmers need to be aware of locations of resources and need to write additional codes for using remote resources in scripts. This makes scripts more complicated than those which use only local resources and cancels out the merit of script languages. We propose a virtual single computer model on wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible manufacturing control with PLC, CNC and software agents

    Publication Year: 2001, Page(s):365 - 371
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (444 KB) | HTML iconHTML

    This paper reports on the design and realization of a flexible and robust control system, based on an agent architecture. Regarding the increasing availability, performance and acceptance of distributed object-oriented systems as well as the growing number of agent-oriented software it is natural to adapt and use the capabilities of both object-oriented and agent-oriented software as a platform fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous information provision to achieve reliability for users and providers

    Publication Year: 2001, Page(s):65 - 72
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (576 KB) | HTML iconHTML

    The rapid growth of information technology and the Internet have given rise to an increasing demand for information services. A large number of service providers offer information services to diversified users on the Internet. Users' requirements are heterogeneous and change very quickly. Popular servers are overloaded and cannot dynamically adapt to meet users' heterogeneous requirements. It is n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high assurance on-line recovery technology for a space on-board computer

    Publication Year: 2001, Page(s):47 - 56
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (768 KB) | HTML iconHTML

    A high-assurance online recovery technology for a space on-board computer that can be realized using commercial devices is proposed whereby a faulty processor node confirms its normality and then recovers without affecting the other processor nodes in operation. Also, the result of an evaluation test using the breadboard model (BBM) implementing this technology is reported. Because this technology... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile agent messaging models

    Publication Year: 2001, Page(s):278 - 286
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (732 KB) | HTML iconHTML

    It is not easy to make the decision of which messaging model to use in a mobile agent system. There are many different models to choose from and there are many forces influencing each model. We discuss five messaging models: Home-Proxy, Follower-Proxy, Email, Blackboard and Broadcast. We overview the forces that are the most important to all models and identify to what extent the forces influence ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building holonic control systems with function blocks

    Publication Year: 2001, Page(s):247 - 250
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (316 KB) | HTML iconHTML

    In today's global marketplace, people want highly-customised products to satisfy their individual requirements. However traditional manufacturing technology is not geared towards high-mix, low-volume manufacturing. Holonic manufacturing systems (HMS) is a new paradigm whose goal is to bridge this divide. HMS offers a migration path so manufacturing enterprises can continuously reconfigure themselv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An automated negotiation model for electronic commerce

    Publication Year: 2001, Page(s):29 - 36
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (820 KB) | HTML iconHTML

    Electronic commerce applications are lacking a bilateral negotiation model which provides the bargaining between two participants (supplier and consumer) in order to buy and sell goods. This paper proposes a negotiation protocol between two participants, as well as the similarity measures which were implemented to find a similar product when a specific one could not be found. The proposed protocol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Commitment-based interoperation for e-commerce

    Publication Year: 2001, Page(s):161 - 168
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (548 KB) | HTML iconHTML

    Successful e-commerce presupposes techniques by which autonomous trading entities can interoperate. Although much progress has been made on data exchange and payment protocols, interoperation in the face of autonomy is still inadequately understood. Current techniques, designed for closed environments, support only the simplest interactions. We develop a multiagent approach for interoperation in e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.