2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology

Volume 2 • 15-18 Sept. 2009

Go

Filter Results

Displaying Results 1 - 25 of 115
  • IAT 2009 - Front cover

    Publication Year: 2009, Page(s): C1
    Request permission for reuse | PDF file iconPDF (3941 KB)
    Freely Available from IEEE
  • IAT 2009 [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • IAT 2009 [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • IAT 2009 [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • IAT 2009 Table of contents

    Publication Year: 2009, Page(s):v - xii
    Request permission for reuse | PDF file iconPDF (226 KB)
    Freely Available from IEEE
  • IAT 2009 Welcome Message from Conference Chair and Program Chair

    Publication Year: 2009, Page(s):xiii - xiv
    Request permission for reuse | PDF file iconPDF (84 KB) | HTML iconHTML
    Freely Available from IEEE
  • IAT 2009 and WI 2009 Conference Organization

    Publication Year: 2009, Page(s):xv - xvii
    Request permission for reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • IAT 2009 Program Committee Members

    Publication Year: 2009, Page(s):xviii - xx
    Request permission for reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • IAT 2009 Non-PC Reviewers

    Publication Year: 2009, Page(s): xxi
    Request permission for reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • IAT 2009 Sponsors

    Publication Year: 2009, Page(s): xxii
    Request permission for reuse | PDF file iconPDF (446 KB)
    Freely Available from IEEE
  • Search Computing

    Publication Year: 2009, Page(s): 1
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    “Who are the strongest European competitors on software ideas? Who is the best doctor to cure insomnia in a nearby hospital? Where can I attend an interesting conference in my field closest to a sunny beach?" This information is available on the Web, but no software system can accept such queries nor compute the answer. We hereby propose search computing as a new multi-disciplinary science which w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Swarm-Bots and Swarmanoid: Two Experiments in Embodied Swarm Intelligence

    Publication Year: 2009, Page(s):2 - 3
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (342 KB)

    Swarm intelligence is the discipline that deals with natural and artificial systems composed of many individuals that coordinate using decentralized control and self-organization. In particular, it focuses on the collective behaviors that result from the local interactions of the individuals with each other and with their environment. The characterizing property of a swarm intelligence system is i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent Based Aiding of Human Teams

    Publication Year: 2009, Page(s):4 - 5
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (346 KB)

    Teams are a form of organizational structure where the team members engage in information exchanges in order to fulfill team goals. The activities that the team engages in are inter-dependent and usually involve gathering, interpreting and exchanging information; creating and identifying alternative courses of action; choosing among alternatives by considering different viewpoints of team members;... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Mining for Malicious Code Detection and Security Applications

    Publication Year: 2009, Page(s):6 - 7
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (346 KB)

    Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. Data mining has many applications in security including for national security as well as for cyber security. The threats to national security include attacking buildings, destroying critical infrastructures such as power ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Social Network Modeling

    Publication Year: 2009, Page(s): 8
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (337 KB)

    The recent development of Web 2.0 has provided an enormous increase in human interactions across all corners of the earth. One manifestation of this is the growth of computer mediated social networks. Many notable Web 2.0 applications such as Facebook, Myspace and LinkedIn are social networks. Relational networks are becoming an important technology for modeling these types of social networks and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing Actionable Trading Strategies for Trading Agents

    Publication Year: 2009, Page(s): 9
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (343 KB)

    Trading agents are useful for developing and back-testing quality trading strategies for taking actions in the real world. The existing trading agent research mainly focuses on simulation using artificial data. As a result, the actionable capability of developed trading strategies is often limited, and the trading agents therefore lack power. Actionable trading strategies can empower trading agent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Various Levels from Brain Informatics to Web Intelligence

    Publication Year: 2009, Page(s):10 - 11
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (249 KB)

    In the early stage of artificial intelligence (AI), AI very closed to then modern cognitive psychology based on the recognition that both computer and human brain are information processing machines meeting the requirements to show intelligence. It seems that the similar trend appears again today between Web Intelligence (WI) and Brain Informatics (BI) based on the recognition that both World Wide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intelligent Agent That Autonomously Learns How to Translate

    Publication Year: 2009, Page(s):12 - 19
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    We describe the design of an autonomous agent that can teach itself how to translate from a foreign language, by first assembling its own training set, then using it to improve its vocabulary and language model. The key idea is that a Statistical Machine Translation package can be used for the Cross-Language Retrieval Task of assembling a training set from a vast amount of available text (e.g. a l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive-Agent-Based Modeling of a Financial Market

    Publication Year: 2009, Page(s):20 - 27
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    This paper describes our experience in building an evolutionary system for agent-based modeling of a financial market. The system uses a type of BDI agents, which are deliberative agents with a mental state defined by a belief base and by a set of desire-generation rules. Beliefs are fuzzy and trust in information sources is taken into account. At any moment, an agent generates a set of desires an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Globally Optimal Multi-agent Reinforcement Learning Parameters in Distributed Task Assignment

    Publication Year: 2009, Page(s):28 - 35
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    Large-scale simulation studies are necessary to study the learning behaviour of individual agents and the overall system dynamics. One reason is that planning algorithms to find optimal solutions to fully observable general decentralised Markov decision problems do not admit to polynomial-time worst-case complexity bounds. Additionally, agent interaction often implies a non-stationary environment ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Deterrence Sanctions in a Normative Framework

    Publication Year: 2009, Page(s):36 - 43
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1114 KB) | HTML iconHTML

    Normative environments are used to regulate multi-agent interactions. In business encounters, agents representing business entities make contracts including norms that prescribe what agents should do. Agent autonomy, however, gives agents the ability to decide whether they fulfill or violate their commitments. In this paper we present an adaptive mechanism that enables a normative framework to cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MACSIMA: Simulating the Co-evolution of Negotiation Strategies in Agent-Based Supply Networks

    Publication Year: 2009, Page(s):44 - 51
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (879 KB) | HTML iconHTML

    In this paper, we describe the multiagent supply chain simulation framework MACSIMA. This framework allows the design of large-scale supply network topologies consisting of a multitude of autonomous agents representing the companies in the supply network and acting on their behalf. MACSIMA provides all agents with negotiation and learning capabilities so that the co-evolution and adaptation of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-a(ge)nt Graph Patrolling and Partitioning

    Publication Year: 2009, Page(s):52 - 57
    Cited by:  Papers (13)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (461 KB) | HTML iconHTML

    Abstract--- We introduce a novel multi agent patrolling algorithm inspired by the behavior of gas filled balloons. Very low capability ant-like agents are considered with the task of patrolling an unknown area modeled as a graph. While executing the proposed algorithm, the agents dynamically partition the graph between them using simple local interactions, every agent assuming the responsibility f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-agent Resource Negotiation for Social Welfare

    Publication Year: 2009, Page(s):58 - 61
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    This study seeks to provide scalable and distributed algorithms to solve the resource allocation problem within an agent community. We propose an approach that can be applied to any kind of contact network, any range for the utility values, for the most important social welfare notions, avoiding the centralized approach drawbacks. In that purpose, we study various agent behaviors. We show that the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Model Transformation in Agent-Oriented Software Engineering

    Publication Year: 2009, Page(s):62 - 65
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    To integrate model transformation technology in agent-oriented software engineering is helpful to improve the quality and efficiency of agent-based software development, and therefore to make AOSE to be widely adopted by researchers and practitioners in software engineering community. This paper integrates model transformation technology into an agent-oriented methodology ODAM that is based on org... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.