By Topic

IEEE/WIC International Conference on Intelligent Agent Technology, 2003. IAT 2003.

13-16 Oct. 2003

Filter Results

Displaying Results 1 - 25 of 110
  • Multi-agent autonomic architecture and its application in e-medicine

    Publication Year: 2003, Page(s):601 - 604
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    Autonomic computing is an entirely new philosophy for the development of computing systems. This paper first presents the basic concept and principle of autonomic computing. Then, an architecture is proposed for autonomic computing systems. Finally, design issues of a multi-agent autonomic architecture and the collaborative environment for e-medicine are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using self-organization for functional integrity maintenance of wireless sensor networks

    Publication Year: 2003, Page(s):535 - 538
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    This paper deals with an application of multiagent self-organization techniques to intelligent sensor networks. We sketch a multiagent system's architecture according to the AEIO method for the EnvSys project. This multiagent system consists of self-organizing hybrid agents. We present interesting results in the last part showing the benefits of this approach compared to traditional ad-hoc protoco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On need-driven proactive information exchanges in agent teams

    Publication Year: 2003, Page(s):350 - 356
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    Members of high-performing human teams can often anticipate information needs of teammates and offer relevant information to them proactively. Such capabilities are highly desirable for agent teams to achieve better teamwork processes for supporting information gathering, information fusion, and decision makings of teammates. This paper presents a framework for formally specifying proactive agent ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of hybrid negotiation in resource coordination among agents

    Publication Year: 2003, Page(s):133 - 139
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    In this paper, we present a coordination strategy using a hybrid negotiation mechanism for multi-agent systems. The particular application is distributed resource allocation among agents. Agents adaptively coordinate resource among themselves to handle possible resource shortage crises resulted from dynamic events they encounter in an uncertain environment. The hybrid negotiation mechanism combine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A JMS Message Transport Protocol for the JADE platform

    Publication Year: 2003, Page(s):596 - 600
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB) | HTML iconHTML

    A prerequisite of joining an enterprise system is the ability to cope with the rigorous demands experienced within such systems. One of the most fundamental of these demands is the requirement for enterprise-level systems to have guaranteed reliable messaging between the participants of the system. Our research involves integrating an agent platform with an enterprise messaging service. This first... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed ubiquitous software services

    Publication Year: 2003, Page(s):531 - 534
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    This paper presents both theoretical and experimental results enabling the distributed implementation of ubiquitous software services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling agent-based load balancing with time delays

    Publication Year: 2003, Page(s):189 - 195
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    In grid computing, agent-based load balancing is one of the most important problems. In this paper, we present a macroscopic model to describe the dynamics of agent-based load balancing with time delays. We concern the number and size of teams where tasks queue. The time gap, during which a single agent searches a suitable node and transfers a task to the node, is incorporated into balancing proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FLIP: a platform to integrate embodied agent technology

    Publication Year: 2003, Page(s):103 - 110
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    Flexibility and adaptability are essential properties of intelligent manufacturing systems. However, it is a major challenge to realize these properties and it is expensive to develop prototypes that are authentic and at the same time useful with respect to integration of state-of-the-art technologies in the area of agents and artificial intelligence. The use of cheap and flexible, yet realistic p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal framework for modeling and simulation of DDoS attacks based on teamwork of hackers-agents

    Publication Year: 2003, Page(s):507 - 510
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    The modern Internet is at rather dangerous stage of its life cycle. Taking into account a today's level of computer network security, the Internet can simply cease to work, if the current tendency of growth of number and capacity of distributed denial-of-service (DDoS) attacks to root servers will proceed. In the paper we discuss that in order to combat DDoS, the computer community needs to develo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web course self-adaptation

    Publication Year: 2003, Page(s):614 - 617
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    This paper describes the methodology of an intelligent agent for building a self-adaptive course on the Web. An important task, therefore, is to combine adaptability with the learner-driven course in order to get a self-adaptive mechanism. For this, we have suggested new structure for a Web course. Based on this structure, we have suggested a new method to evaluate the granularity level of each se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovery and sharing of knowledge with self-organized agents

    Publication Year: 2003, Page(s):126 - 132
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    This paper describes a system, which has the capability to analyze and discover knowledge gathered from distributed sources. This autonomous system is implemented using the growing self organizing map (GSOM), which is a dynamic version of the self organizing map (SOM) and a multi agent communication system. The important contribution of this model is its ability to transfer local knowledge to a ce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multiagent system for optimizing urban traffic

    Publication Year: 2003, Page(s):411 - 414
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    For the purposes of managing an urban traffic system, a hierarchical multiagent system that consists of several locally operating agents each representing an intersection of a traffic system is proposed. Local traffic agents (LTAs) are concerned with the optimal performance of their assigned intersection; however, the resulting traffic light patterns may result in the failure of the system when ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A procedure for mediating between service requesters and providers

    Publication Year: 2003, Page(s):592 - 595
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    In MAS, middle agents are commonly used to find appropriate provider agents for a given request. Most middle agents match the request with providers' advertised capabilities, selecting a set of providers which are all able to treat it. We describe a mediation procedure to complement matchmaking. Given a request, the selected providers send monetary bids to the middle agent, expressing their will t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual enterprise formation with agents - an approach to implementation

    Publication Year: 2003, Page(s):527 - 530
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    The formation of a virtual enterprise and the selection of its partners is an important process in the lifecycle of a virtual enterprise. In this paper, we present the virtual enterprise formation process as an agent interaction protocol and an approach to its implementation. We have focused on the selection of partners within the formation process in order to understand these interactions and the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inaccessibility in multi-agent systems

    Publication Year: 2003, Page(s):182 - 188
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    In standard situations, agents in a multi-agent community need to communicate each other to accomplish cooperation and coordination of joint activities. Normally it is expected that each agent can contact any other using a reliable communication infrastructure. Often one has to think about situations when a communication subsystem becomes disintegrated and some agents become isolated from the rest... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An XML-based multi-agent system for the user-oriented management of QoS in telecommunications networks

    Publication Year: 2003, Page(s):96 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    In this paper, we propose XICOMASQ, an XML-based multi-agent system for the user-oriented management of QoS in telecommunications networks. XICOMASQ is characterized by the following features: (i) it is strongly subjective, i.e. it handles network management activities according to user preferences represented by a user profile; (ii) it can operate on a large variety of telecommunications networks... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A two-level negotiation framework for complex negotiations

    Publication Year: 2003, Page(s):311 - 317
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    In this paper, we present a negotiation framework in which the negotiation process is performed at two levels. The upper level deals with the formation of high-level goals and objectives for the agent, and the decision about whether or not to negotiate with other agents to achieve particular goals or bring about particular objectives. Negotiation at this upper level determines the rough scope of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-oriented framework for decision tree evolution

    Publication Year: 2003, Page(s):503 - 506
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    An autonomous evolutionary framework for construction of decision trees that requires no or minimal human interaction is presented. The framework evolves two types of agents which hold the discovered knowledge, and uses a non-standard implicit fitness evaluation in a co-evolving environment. Together with self-adaptation of evolutionary parameters and with some other improvements it can monitor an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An investigation of the long-term impact of knowledge sharing on multi-agent systems

    Publication Year: 2003, Page(s):385 - 391
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3905 KB) | HTML iconHTML

    Knowledge sharing is crucial to improve the performance of computationally limited agents with limited knowledge. In this paper, we investigate the long-term impact of knowledge sharing on the overall performance of a multi-agent system. In particular, we study the diffusion of knowledge by introducing a formal model. We also analyze the long run equilibrium of it through simulations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing flexible negotiation agent with relaxed decision rules

    Publication Year: 2003, Page(s):282 - 289
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    This article presents a model for designing negotiation agent with two distinguishing features: 1) a market-driven strategy and 2) a set of relaxed decision rules. Market-driven agents make adjustable rates of concession by reacting to changing market situations. In determining the amount of concession for each negotiation round, a market-driven agent is guided by three mathematical functions of r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel vertical mining on Diffsets structure

    Publication Year: 2003, Page(s):343 - 349
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    Mining frequent patterns on the vertical data structures usually shows improvements of performance over the classical horizontal structure. This is because the vertical data structure supports fast frequency counting via intersection operations on transaction identifiers (TIDs). Recently, Diffsets by M.J. Zaki and K. Gouda (2001), a vertical data representation, has been introduced for the sake of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Person name identification in Chinese documents using finite state automata

    Publication Year: 2003, Page(s):478 - 481
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    This research is about automatic identification and extraction of person names in Chinese text documents. Solutions to this problem have immediate and extensive applications in many areas especially in Web Intelligent Agents related applications such as Web search engines, Web data mining, and automatic Web information analysis. We have noted that while finite state automata (FSA) based techniques... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-agent coalition via autonomous price negotiation in a real-time Web environment

    Publication Year: 2003, Page(s):580 - 583
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    In e-marketplaces, customers specify job requests in real-time and agents form coalitions to service them. This paper proposes a protocol for self-interested agents to negotiate prices in forming successful coalitions. We propose and experiment with two negotiation schemes: one allows information sharing while the other does not. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Arithmetic circuit for the first solution of distributed CSPs with cryptographic multi-party computations

    Publication Year: 2003, Page(s):609 - 613
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    A large class of problems like meeting scheduling, negotiation, or different types of coordination, can be formulated in terms of agents, variables, and constraints (i.e. predicates) on those variables. Distributed Constraint Satisfaction (DisCSP) is a framework addressing such general problems, namely defined in terms of a set of agents, variables, and constraints that the different agents enforc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Problem-solving in open environments

    Publication Year: 2003, Page(s):203 - 210
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    With the increasing use of the Internet, many problem-solving tasks such as resource allocation, scheduling, planning, and configuration pose themselves in an open setting involving multiple participants. Existing search-based problem-solving techniques are based on the closed-world assumption and require that all options be collected before problem-solving can start. This approach of turning the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.