Proceedings ISADS 95. Second International Symposium on Autonomous Decentralized Systems

25-27 April 1995

Filter Results

Displaying Results 1 - 25 of 57
  • Proceedings ISADS 95. Second International Symposium on Autonomous Decentralized Systems

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • A model for negotiation among agents based on the transaction analysis theory

    Publication Year: 1995, Page(s):427 - 433
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (587 KB)

    In the research work presented, interactions among the various types of agents in autonomous decentralized systems are based on the theory of transaction analysis (TA) of psychology. Human beings are considered one particular type of autonomous agent. Hence, the agent's structure as well as interactions among them are defined and performed much the same as human behavior and attitudes. Cooperation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autoconfigurable distributed control systems

    Publication Year: 1995, Page(s):162 - 168
    Cited by:  Papers (6)  |  Patents (45)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (637 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Cooperating Autonomous Decentralized System Architecture

    Publication Year: 1995, Page(s):40 - 47
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    Research can rarely be performed on open platform based large scale distributed systems which always consist of heterogeneous sub-systems and heterogeneous hardware and software components. It is not also pursued to realize the integration of these sub-systems, highly reliable system operations and high productivity of application software development. Our solution is a Cooperating Autonomous Dece... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A uniform software architecture for cooperation, reliability and reconfiguration of autonomous decentralized systems

    Publication Year: 1995, Page(s):33 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB)

    Large and complex decentralized systems with autonomous components often require appropriate mechanisms for cooperation, reliability, and dynamic reconfiguration. It is crucial that these mechanisms allow the system to execute continuously for a long period of time with minimal disruption, despite failure or reconfiguration of some components. They should also allow various components to interact ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An object-oriented software development framework for autonomous decentralized systems

    Publication Year: 1995, Page(s):405 - 411
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    Developing software for distributed computing systems is challenging, due to lack of good software development methodologies for distributed computing systems. It is very important to develop reliable, adaptable and expandable application software for distributed computing systems. Autonomous decentralized systems (ADS) is a distributed computing system with online expandability, online maintainab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach to asynchronous, decentralized decision-making in military command and control

    Publication Year: 1995, Page(s):25 - 31
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    This paper proposes a novel asynchronous, decentralized decision-making algorithm for military command and control. Unlike centralized command and control, in the proposed approach, all entities-infantry, tanks, and aircrafts, of the system are granted significant autonomy, subject to strict guidelines and directives, and provided with the necessary computing power, intelligence gathering faciliti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ACP/EM: an approach to manage distributed environment for autonomous decentralized systems

    Publication Year: 1995, Page(s):399 - 404
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    The autonomous decentralized systems (ADS) concept has been expanded to handle subsystem configuration on distributed computing environments effectively. The concept introduces the “group” as a logical set of subsystems based on application software or an organization. Subsystems on a “group” have an equal influence on the entire “group” and are hidden from the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security issues in mobile communications

    Publication Year: 1995, Page(s):19 - 24
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    Recent years have witnessed the rapid growth of mobile computing environments. One of the major concerns in such environments is security, specially in the context of wireless communications. We describe some of the important issues which need to be addressed in designing a security scheme for mobile communications. These include autonomy of communicating entities, mobility of the users, limitatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The living factory: applications of artificial life to manufacturing

    Publication Year: 1995, Page(s):391 - 397
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    The paper discusses current and future applications of artificial life (ALife) to assembly line product sequencing and shop floor control. ALife offers a new methodology by which managers can explore and develop innovative manufacturing strategies. After a brief introduction to elementary concepts of artificial life, it describes three current manufacturing applications, and then outlines current ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis using SPN of a mobile telecommunication network under heavy load

    Publication Year: 1995, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    Stochastic Petri Net (SPN) is used as a performance modeling tool for a mobile telecommunication network: two mobile switching centers (MSCs) connected to a common access tandem. This is an example high level model of the network. Even then it has millions of states making an exact analysis infeasible. A new method based on the preferred cycle heuristic substantially reduces the state space while ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallelizing a level 3 BLAS library for LAN-connected workstations

    Publication Year: 1995, Page(s):70 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    Parallel BLAS libraries have recently shown promise as a means of taking advantage of parallel computing in solving scientific problems. However, little work has been done on providing such a parallel library in LAN-connected workstations. Our motivation for this research lies in the strong belief that since LAN-connected workstations are highly cost-effective, it is important to study the issues ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The synchronizing of loosely coupled distributed real time system

    Publication Year: 1995, Page(s):384 - 390
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    In this paper the control architecture and the characteristics of the synchronization of an industrial application are presented. The control procedure is implemented with a loosely coupled distributed real time system, where parallel processing is possible. There are five nodes in the network, one master actuator, three slave actuators and a machine controller. All nodes are implemented using Mot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A pictorial pattern recognition based on an associative memory by use of the reaction-diffusion equation

    Publication Year: 1995, Page(s):249 - 256
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    Visual information processing in biological systems is performed simultaneously and in parallel at each neural unit. That is, a global task with no supervisor is achieved by the interaction among many subsystems. In this sense, the visual process shares the common functional structure with `autonomous decentralized systems' which have attracted much attention in the field of system engineering. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information infrastructure and wide information services systems

    Publication Year: 1995, Page(s):2 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (928 KB)

    From the time that online real time systems were first developed, common carriers have made efforts to provide wide information services systems along with information infrastructure-information oriented networks. In Japan NTT Public Corp., which was the only common carrier at that time, began wide information services under the name of “data communications services” in the late 1960s.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an enterprise modelling method for CSCW systems

    Publication Year: 1995, Page(s):352 - 358
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    Autonomy is seen as a central concept for the modelling of enterprises, particularly where we are proposing to develop systems for the support of cooperative work (CSCW systems). Autonomy in a cooperative setting is not dealt with well by current enterprise modelling methods. We look to the area of distributed artificial intelligence for work that deals with this, and adapt what we find to the nee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A truant failure detection algorithm for multi-policy distributed systems

    Publication Year: 1995, Page(s):297 - 303
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    In recent autonomous decentralized systems, every node might not execute the same algorithm because it might have its own local policy and follow that policy rather than the common principle. We model these systems as a multi-policy distributed system. We introduce a new type of failure, a truant failure, on multi-policy distributed systems, which is considered to be the simplest local policy. A t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving interoperability through ODP trading function

    Publication Year: 1995, Page(s):63 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    Interoperability between autonomous decentralized systems needs support of an information service that can provide dynamic knowledge about available service providers within the network. We describe trading service. Trading is an essential infrastructure function indicated by the ODP (open distributed processing) reference model, a meta model of heterogeneous distributed processing. The purpose of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A semi-autonomous decentralized system for controlling street traffic signals

    Publication Year: 1995, Page(s):377 - 383
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    Our work is based on distributed and knowledge-based methodology for real-time control of street and highway ramp signals. After a running prototype system that proved the feasibility of the approach, we have now completed the first part of a complex, two-phase learning program of the traffic control regime. It produces optimum local (intersection) control of signals in steady-state traffic scenar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed management of network links supporting multimedia computing

    Publication Year: 1995, Page(s):242 - 248
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    The paper analyses distributed algorithms used to control network links carrying random data traffic generated by multimedia computing based on local information. Distributed computing, multimedia mail, and interactive shopping are just a few examples of applications where the current approaches for traffic control (as foreseen by ITU-TS) are not suitable. Traffic descriptors (other than maybe pea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A decentralized social algorithm for committee coordination problem

    Publication Year: 1995, Page(s):345 - 351
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    We consider an extended committee coordination problem in an autonomous decentralized social environment. The basic committee coordination problem and a distributed algorithm, as a solution to this problem in a distributed environment, are presented by K.M. Chandy and J. Misra (1988). The algorithm guarantees the synchronous and exclusion properties of the problem and is fair (i.e. starvation-free... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On efficiently tolerating general failures in autonomous decentralized multiserver systems

    Publication Year: 1995, Page(s):288 - 296
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    We consider a multiserver system consisting of a set of servers that provide some service to a set of clients by accessing some shared objects. The goal is to provide reliable service in spite of client or server failures such that the overhead during normal operating periods is low. We consider a relatively general fault model where a faulty processor can write spurious data for a period of time ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic subgoal generation of autonomous agents moving in a lattice world

    Publication Year: 1995, Page(s):434 - 441
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    The paper approaches self organization of autonomous agents moving in a lattice world to achieve a shared final goal from the viewpoint of self regeneration and forced regeneration of subgoals. The model is referred to as The Tower of Babel proposed by T. Ishida (1991), which includes block subgoal and intersection subgoal. First, the paper proposes fundamental schemes to make a decision on block ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The pinwheel asynchronous atomic broadcast protocols

    Publication Year: 1995, Page(s):215 - 221
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    We discuss two asynchronous atomic broadcast protocols that provide fast delivery and stability times, use a small number of messages to accomplish a broadcast, distribute evenly the processing load, use efficient flow control techniques, and provide gracefully degraded performance in the presence of communication failures. In a prototype implementation on top of UDP and Ethernet, for a group of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifying agents in the SF specification language

    Publication Year: 1995, Page(s):112 - 118
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    The traditional object paradigm is evolving into a paradigm of distributed, self initiating agents. To specify the functional requirements of agent systems, we need languages capable of analytic and coherent description of self initiation. The paper assesses the suitability of SF relative to other approaches, using criteria that consider the requirements of traditional software engineering and int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.