Integration of Knowledge Intensive Multi-Agent Systems, 2003. International Conference on

30 Sept.-4 Oct. 2003

Filter Results

Displaying Results 1 - 25 of 125
  • Task management in sensor-provided operator platforms

    Publication Year: 2003, Page(s):596 - 601
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (427 KB) | HTML iconHTML

    An agent architecture for modelling of operator controlled platform interaction is presented. The approach accounts for distributed decision making in autonomous but cooperating operator guided mobile platforms. Each platform has a kernel which interacts with operators, sensors and other platforms. In platform-operator interaction, the agent model facilitates task management and automation control... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial intelligence and sensor fusion

    Publication Year: 2003, Page(s):591 - 595
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    Future US air force sensor systems must be able to adapt to changing environments in real time. A capabilities-based modeling approach is a new method being promoted for the building of the next generation weapon systems. To accommodate this modeling approach the Department of Defense (DoD) is promoting the use of waveform diversity for radar systems. Building a weapon system including one or more... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capabilities aware routing for dynamic adhoc networks

    Publication Year: 2003, Page(s):585 - 590
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    Our objective is to design and construct a useful routing protocol for an adhoc wireless network. While working primarily in the small, hand-held computing device arena, Bluetooth wireless technology has emerged as the network medium of choice. We introduce Bluetooth wireless technology, examine current routing protocols, and present the objectives and considerations for the design of a new Blueto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sapient agents - seven approaches

    Publication Year: 2003, Page(s):166 - 171
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    During the last several years, a large class of computer programs, called "intelligent agents" (IAs), has emerged as a result of intensive research efforts in various countries. There is ongoing discussion how to classify the individual types of intelligent agents and how to distinguish between them and a subclass called "sapient agents" (SAs). Seven approaches are proposed to distinguish SAs from... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Catalytic reaction sets, decay, and the preservation of information

    Publication Year: 2003, Page(s):133 - 138
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    We study the ability to maintain information in a population of protocells that enclose sets of reacting polymers or metabolisms, under the influence of decay, i.e., spontaneous breakdown of large polymers. At a certain decay rate, it becomes impossible to maintain a significant concentration of large polymers, while it is still possible to maintain sets of smaller polymers that contain the same a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An infrastructure for adaptive control of multi-agent systems

    Publication Year: 2003, Page(s):230 - 236
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (533 KB) | HTML iconHTML

    We present the control infrastructure of the Cougaar distributed agent system that was developed under the DARPA ALP and UltraLog programs. We motivate its design from a control theory perspective and discuss the characteristics of an agent system as the controlled process. These characteristics are arguably the reason why formal methods of control theory are rarely applied in software engineering... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding unique records in unknown data

    Publication Year: 2003, Page(s):580 - 584
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    We describe techniques to identify data records that have unique or novel field value combinations. These techniques allow the rapid identification of unique records in data sets without a priori knowledge of field values or field-value ranges. This results in the formulation and creation of new knowledge about the data, based on information that is not evident and is not otherwise easily obtained... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elements of the theory of interpretation: a life-and-intelligence (LI)-mimetic approach to education

    Publication Year: 2003, Page(s):463 - 476
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (938 KB) | HTML iconHTML

    The views presented here stem from the multiple factual and methodological resemblances that can be found among many domains of knowledge. The effort started with searching for BIO-mimetic tools of education and arrived at LI-mimetic approach. Admitting the significance of LI-resemblances can be instrumental for restructuring the system of undergraduate education. We are permeated by explications ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards computational sapience (wisdom): a paradigm for sapient (wise) systems

    Publication Year: 2003, Page(s):158 - 165
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (614 KB) | HTML iconHTML

    We present a paradigm that can contribute with some essential aspects to establish a baseline for the development of computational sapience (wisdom), sapient (wise) decision/control, and sapient (wise) systems as new disciplines/fields. It is demonstrated here that, under the proposed paradigm, computational sapience (wisdom), sapient (wise) decision/control, and sapient (wise) systems methodologi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture for combining ways to think

    Publication Year: 2003, Page(s):669 - 674
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (470 KB) | HTML iconHTML

    Why have AI researchers not been able to give computers human-like 'common sense', the ability to think about ordinary things the way people can? In our view, the source of the difficulty is that they too often seek after types of cognitive architectures, kinds of representations, and methods of inference that are based on some single, simple process, theory, or principle. Despite their elegance, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using a semiotics-inspired tool for the control of intelligent opponents in computer games

    Publication Year: 2003, Page(s):647 - 652
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    We describe the use of a semiotics-inspired technology - semionics, in the control system of an intelligent agent used as an opponent in a first-person shooter computer game - Counter-Strike. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying sets of key players in a network

    Publication Year: 2003, Page(s):127 - 131
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    Two problems are considered: finding a set of nodes that is maximally connected to all other nodes (KPP-Pos), and finding a set of nodes whose removal would result in a residual network of minimum cohesion. The problems are solved by the introduction of connectedness and fragmentation metrics, which are incorporated in a combinatorial optimization procedure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposal on a model of an autonomous agent using the meta-level architecture

    Publication Year: 2003, Page(s):83 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    We propose a model on the structure of an autonomous agent using the meta-level architecture, which consists of two level, that is, base-level and meta-level. In the base-level of an agent, usual computations are performed. In the meta-level of an agent, several computations, for example, load balancing, communications among other agents and so on, are executed. Therefore, multiagent applications ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A non-hierarchical method for distributed hypothesis management

    Publication Year: 2003, Page(s):517 - 522
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (590 KB) | HTML iconHTML

    We describe an approach to the distributed management of multiple hypotheses within a society of agents (or peer groups) without need of a centralized controller. The distributed architecture is based on two key concepts: (1) efficient assignment, ranking and association of local hypotheses at each peer, and (2) a market-based information sharing model for exchanging hypotheses within and across p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative multiple robots prevent energy repletion problem

    Publication Year: 2003, Page(s):224 - 229
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    We propose cooperative behaviors between robots that can prevent the blind hunger dilemma through a case study. The effectiveness of the proposed cooperation is confirmed by experimental demonstrations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In search for hidden meaning: Pospelov's work on applied semiotics

    Publication Year: 2003, Page(s):575 - 578
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Dmitrii Pospelov, who recently celebrated his 70 year anniversary, is a mathematician with a widely open scientific horizon. The purpose of this plenary lecture is to give a survey of some results of D. Pospelov in the area of applied semiotics and to show that his real intention was to elicit the meaning underlying various phenomena which he studied. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordinated multi-procedural architecture for probabilistic knowledge discovery

    Publication Year: 2003, Page(s):457 - 462
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (491 KB) | HTML iconHTML

    Current data mining procedures utilize operating cycles that encompass selection of the input data learning subset, filtering, application of the chosen mining algorithm, presentation of the output knowledge, and evaluation of the system performance on the unseen test data subset. However, a single pass through the above phases cannot achieve an appreciable result. We introduce an architecture tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cellular inference network (CIN) for learning and control of multi-agent cooperation

    Publication Year: 2003, Page(s):151 - 156
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (479 KB) | HTML iconHTML

    The coordination and learning process in a multiagent system (MAS) can be modeled as a control and adaptation process of a hybrid dynamic system. We study an inference network organized in cellular structure for supporting multiple levels of abstraction and reasoning in learning and control of MAS. Specifically, we study how the cellular inference structure can serve as a representation of hybrid ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-based systems key enabler for the army's future force

    Publication Year: 2003, Page(s):249 - 254
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (562 KB) | HTML iconHTML

    The objective is to identify and discuss several potential application areas for intelligent agent technology that will enable the US Army to rapidly transform itself from its current military organization and operational capabilities to that of a future, more modern force structure. The thrust of the US Army's transformation concept is to evolve to a lighter, leaner, faster, more highly mobile an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic integration of distributed semantic services

    Publication Year: 2003, Page(s):684 - 689
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB) | HTML iconHTML

    Global networking is changing the way that we think about and perform computation. Network-based computing may link tens or hundreds of distributed devices, sensors and computing resources to support an application. Therefore, a critical challenge is how dynamically to discover and integrate these distributed services seamlessly for various applications. In this paper, many cutting-edge technologi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision-making processes in organizations: a logical-semiotic perspective

    Publication Year: 2003, Page(s):664 - 668
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    We present, first, a hybrid-decision support system where a heuristic-data mining procedure is embedded to the original system. Using Peircean terminology, one of the main roles of this heuristic-data mining method is to evaluate n-ary predicates (i.e., quantitative variables, crisp or vague-fuzzy; and qualitative variables, precise or ambiguous) involved in the different types of decisions and me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software tool for agent-based distributed data mining

    Publication Year: 2003, Page(s):710 - 715
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    We describe multi-agent technology and software tool for the joint engineering, implementation, deployment and possibly use of applied multi-agent distributed data mining and distributed decision making systems. The core problem of distributed data mining and decision making technology does not concerns particular data mining techniques, because the respective library of classes can be extended wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clusters with core-tail hierarchical structure and their applications to machine learning classification

    Publication Year: 2003, Page(s):640 - 645
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    We present a method for analysis of clustering results. This method represents every cluster as a stratified hierarchy of its subsets of objects (strata) ordered along a scale of their internal similarities. The "layered structures" can be described as a tool for interpretation of individual clusters rather than for describing the model of the entire data. It can be used not only for comparisons o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The topologies of cooperation in knowledge intensive multi-agent systems

    Publication Year: 2003, Page(s):741 - 746
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    Agents in a multiagent system (MAS) could cooperate in many different ways. The topology of agent cooperation determines how the agents control and communicate with each other, what are the control and communication capabilities of each agent, and how efficient the control and communications are. The topology affects the agents' ability to share knowledge, integrate knowledge, and make efficient u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Destabilizing dynamic networks under conditions of uncertainty

    Publication Year: 2003, Page(s):121 - 126
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    Managing and controlling knowledge intensive dynamic systems requires being able to estimate, analyze, and evaluate, under conditions of uncertainty, the existing system and the impact of actions, such as changes in personnel or resources on this system. Our approach to this problem is dynamic network analysis. Using a combination of statistical and simulation tools, we analyze the robustness unde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.