首页 > 最新文献

International journal of agent technologies and systems最新文献

英文 中文
Multi-Agent Negotiation Paradigm for Agent Selection in B2C E-Commerce B2C电子商务中Agent选择的多Agent协商范式
Pub Date : 2011-04-01 DOI: 10.4018/jats.2011040103
B. Mazumdar, Swati Basak, Neelam Modanwal
Multi agent system MAS model has been extensively used in the different tasks of E-Commerce such as customer relation management CRM, negotiation and brokering. The objective of this paper is to evaluate a seller agent's various cognitive parameters like capability, trust, and desire. After selecting a best seller agent from ordering queue, it applies negotiation strategies to find the most profitable proposal for both buyer and seller. This mechanism belongs to a semi cooperative negotiation type, and selecting a seller and buyer agent pair using mental and cognitive parameters. This work provides a logical cognitive model, logical negotiation model between buyer agent and selected seller agent.
多智能体系统MAS模型已广泛应用于电子商务的客户关系管理、客户关系管理、谈判和代理等不同任务中。本文的目的是评估卖方代理的各种认知参数,如能力、信任和欲望。从订购队列中选择最畅销代理后,应用谈判策略寻找买卖双方最有利可图的方案。该机制属于半合作协商类型,利用心理和认知参数选择买卖双方代理对。本研究提供了一个逻辑认知模型、买方代理与选定卖方代理之间的逻辑谈判模型。
{"title":"Multi-Agent Negotiation Paradigm for Agent Selection in B2C E-Commerce","authors":"B. Mazumdar, Swati Basak, Neelam Modanwal","doi":"10.4018/jats.2011040103","DOIUrl":"https://doi.org/10.4018/jats.2011040103","url":null,"abstract":"Multi agent system MAS model has been extensively used in the different tasks of E-Commerce such as customer relation management CRM, negotiation and brokering. The objective of this paper is to evaluate a seller agent's various cognitive parameters like capability, trust, and desire. After selecting a best seller agent from ordering queue, it applies negotiation strategies to find the most profitable proposal for both buyer and seller. This mechanism belongs to a semi cooperative negotiation type, and selecting a seller and buyer agent pair using mental and cognitive parameters. This work provides a logical cognitive model, logical negotiation model between buyer agent and selected seller agent.","PeriodicalId":93648,"journal":{"name":"International journal of agent technologies and systems","volume":"38 1","pages":"33-52"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77665272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Modeling Virtual Footprints 虚拟足迹建模
Pub Date : 2011-04-01 DOI: 10.4018/jats.2011040101
Rajiv Kadaba
Entities interacting on the web establish their identity by creating virtual personas. These entities, or agents, can be human users or software-based. This research models identity using the Entity-Persona Model, a semantically annotated social network inferred from the persistent traces of interaction between personas on the web. A Persona Mapping Algorithm is proposed which compares the local views of personas in their social network referred to as their Virtual Signatures, for structural and semantic similarity. The semantics of the Entity-Persona Model are modeled by a vector space model of the text associated with the personas in the network, which allows comparison of their Virtual Signatures. This enables all the publicly accessible personas of an entity to be identified on the scale of the web. This research enables an agent to identify a single entity using multiple personas on different networks, provided that multiple personas exhibit characteristic behavior. The agent is able to increase the trustworthiness of on-line interactions by establishing the identity of entities operating under multiple personas. Consequently, reputation measures based on on-line interactions with multiple personas can be aggregated and resolved to the true singular identity.
在网络上互动的实体通过创建虚拟角色来建立自己的身份。这些实体或代理可以是人类用户,也可以是基于软件的。本研究使用实体-人物角色模型(Entity-Persona Model)对身份进行建模,这是一个语义注释的社交网络,从网络上人物角色之间持续的交互痕迹中推断出来。提出了一种人物角色映射算法,该算法比较了人物角色在其社交网络中的局部视图(称为虚拟签名)的结构和语义相似性。实体-人物角色模型的语义由网络中与人物角色相关的文本的向量空间模型建模,该模型允许对其虚拟签名进行比较。这使得一个实体的所有可公开访问的角色可以在网络的规模上被识别。该研究使代理能够使用不同网络上的多个角色识别单个实体,前提是多个角色表现出特征行为。代理能够通过建立在多个角色下操作的实体的身份来增加在线交互的可信度。因此,基于与多个角色在线交互的声誉度量可以被聚合并解析为真正的单一身份。
{"title":"Modeling Virtual Footprints","authors":"Rajiv Kadaba","doi":"10.4018/jats.2011040101","DOIUrl":"https://doi.org/10.4018/jats.2011040101","url":null,"abstract":"Entities interacting on the web establish their identity by creating virtual personas. These entities, or agents, can be human users or software-based. This research models identity using the Entity-Persona Model, a semantically annotated social network inferred from the persistent traces of interaction between personas on the web. A Persona Mapping Algorithm is proposed which compares the local views of personas in their social network referred to as their Virtual Signatures, for structural and semantic similarity. The semantics of the Entity-Persona Model are modeled by a vector space model of the text associated with the personas in the network, which allows comparison of their Virtual Signatures. This enables all the publicly accessible personas of an entity to be identified on the scale of the web. This research enables an agent to identify a single entity using multiple personas on different networks, provided that multiple personas exhibit characteristic behavior. The agent is able to increase the trustworthiness of on-line interactions by establishing the identity of entities operating under multiple personas. Consequently, reputation measures based on on-line interactions with multiple personas can be aggregated and resolved to the true singular identity.","PeriodicalId":93648,"journal":{"name":"International journal of agent technologies and systems","volume":"3 1","pages":"1-17"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81174028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
History Sensitive Cascade Model 历史敏感级联模型
Pub Date : 2011-04-01 DOI: 10.4018/jats.2011040104
Yu Zhang, Maksim Tsikhanovich, Georgi Smilyanov
Diffusion is a process by which information, viruses, ideas, or new behavior spread over social networks. Traditional diffusion models are history insensitive, i.e. only giving activated nodes a one-time chance to activate each of its neighboring nodes with some probability. But history dependent interactions between people are often observed in the real world. This paper proposes the History Sensitive Cascade Model HSCM, a model of information cascade through a network over time. The authors consider the "activation" problem of finding the probability of that a particular node receives information given that some nodes are initially informed. In this paper it is also proven that selecting a set of k nodes with greatest expected influence is NP-hard, and results from submodular functions are used to provide a greedy approximation algorithm with a 1-1/e-e lower bound, where e depends polynomially on the precision of the solution to the "activation" problem. Finally, experiments are performed comparing the greedy algorithm to three other approximation algorithms.
扩散是指信息、病毒、思想或新行为在社交网络中传播的过程。传统的扩散模型是历史不敏感的,即只给激活节点一次机会,以一定的概率激活每个相邻节点。但人与人之间依赖于历史的互动在现实世界中经常被观察到。本文提出了历史敏感级联模型(HSCM),这是一种信息随时间通过网络的级联模型。作者考虑了“激活”问题,即在初始告知某些节点的情况下,找到特定节点接收信息的概率。本文还证明了选取具有最大期望影响的k个节点的集合是np困难的,并利用子模函数的结果提供了一个下界为1-1/e-e的贪心逼近算法,其中e多项式地依赖于“激活”问题解的精度。最后,将贪心算法与其他三种近似算法进行了实验比较。
{"title":"History Sensitive Cascade Model","authors":"Yu Zhang, Maksim Tsikhanovich, Georgi Smilyanov","doi":"10.4018/jats.2011040104","DOIUrl":"https://doi.org/10.4018/jats.2011040104","url":null,"abstract":"Diffusion is a process by which information, viruses, ideas, or new behavior spread over social networks. Traditional diffusion models are history insensitive, i.e. only giving activated nodes a one-time chance to activate each of its neighboring nodes with some probability. But history dependent interactions between people are often observed in the real world. This paper proposes the History Sensitive Cascade Model HSCM, a model of information cascade through a network over time. The authors consider the \"activation\" problem of finding the probability of that a particular node receives information given that some nodes are initially informed. In this paper it is also proven that selecting a set of k nodes with greatest expected influence is NP-hard, and results from submodular functions are used to provide a greedy approximation algorithm with a 1-1/e-e lower bound, where e depends polynomially on the precision of the solution to the \"activation\" problem. Finally, experiments are performed comparing the greedy algorithm to three other approximation algorithms.","PeriodicalId":93648,"journal":{"name":"International journal of agent technologies and systems","volume":"25 1","pages":"53-66"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80840702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Meta-Monitoring Using an Adaptive Agent-Based System to Support Dependent People in Place 使用自适应的基于代理的系统来支持依赖的人的元监控
Pub Date : 2011-01-01 DOI: 10.4018/jats.2011010104
N. Singer, Sylvie Trouilhet, Ali Rammal
In this paper, the authors propose software architecture to monitor elderly or dependent people in their own house. Many studies have been done on hardware aspects resulting in operational products, but there is a lack of adaptive algorithms to handle all the data generated by these products due to data being distributed and heterogeneous in a large scale environment. The authors propose a multi-agent classification method to collect and to aggregate data about activity, movements, and physiological information of the monitored people. Data generated at this local level are communicated and adjusted between agents to obtain a set of patterns. This data is dynamic; the system has to store the built patterns and has to create new patterns when new data is available. Therefore, the system is adaptive and can be spread on a large scale. Generated data is used at a local level, for example to raise an alert, but also to evaluate global risks. This paper presents specification choices and the massively multi-agent architecture that was developed; an example with a sample of ten dependant people gives an illustration.
在本文中,作者提出了一种软件架构,用于监控自己家中的老年人或受抚养的人。虽然在硬件方面已经做了很多研究,但由于数据在大规模环境中是分布式和异构的,缺乏自适应算法来处理这些产品产生的所有数据。作者提出了一种多智能体分类方法来收集和汇总被监测对象的活动、运动和生理信息。在此本地级别生成的数据在代理之间进行通信和调整,以获得一组模式。这些数据是动态的;系统必须存储已构建的模式,并且必须在有新数据可用时创建新模式。因此,该系统具有较强的适应性,可大规模推广。生成的数据用于地方一级,例如发出警报,但也用于评估全球风险。本文介绍了规范选择和开发的大规模多智能体体系结构;以十个依赖他人的人为例进行说明。
{"title":"Meta-Monitoring Using an Adaptive Agent-Based System to Support Dependent People in Place","authors":"N. Singer, Sylvie Trouilhet, Ali Rammal","doi":"10.4018/jats.2011010104","DOIUrl":"https://doi.org/10.4018/jats.2011010104","url":null,"abstract":"In this paper, the authors propose software architecture to monitor elderly or dependent people in their own house. Many studies have been done on hardware aspects resulting in operational products, but there is a lack of adaptive algorithms to handle all the data generated by these products due to data being distributed and heterogeneous in a large scale environment. The authors propose a multi-agent classification method to collect and to aggregate data about activity, movements, and physiological information of the monitored people. Data generated at this local level are communicated and adjusted between agents to obtain a set of patterns. This data is dynamic; the system has to store the built patterns and has to create new patterns when new data is available. Therefore, the system is adaptive and can be spread on a large scale. Generated data is used at a local level, for example to raise an alert, but also to evaluate global risks. This paper presents specification choices and the massively multi-agent architecture that was developed; an example with a sample of ten dependant people gives an illustration.","PeriodicalId":93648,"journal":{"name":"International journal of agent technologies and systems","volume":"1 1","pages":"39-51"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86449790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Simulating Tolerance in Dynamic Social Networks 动态社会网络中的宽容模拟
Pub Date : 2011-01-01 DOI: 10.4018/jats.2011010105
Kristen Lund, Yu Zhang
This paper studies the concept of tolerance in dynamic social networks where agents are able to make and break connections with neighbors to improve their payoffs. This problem was initially introduced to the authors by observing resistance or tolerance in experiments run in dynamic networks under the two rules that they have developed: the Highest Rewarding Neighborhood rule and the Highest Weighted Reward rule. These rules help agents evaluate their neighbors and decide whether to break a connection or not. They introduce the idea of tolerance in dynamic networks by allowing an agent to maintain a relationship with a bad neighbor for some time. In this research, the authors investigate and define the phenomenon of tolerance in dynamic social networks, particularly with the two rules. The paper defines a mathematical model to predict an agent's tolerance of a bad neighbor and determine the factors that affect it. After defining a general version of tolerance, the idea of optimal tolerance is explored, providing situations in which tolerance can be used as a tool to affect network efficiency and network structure.
本文研究了动态社会网络中的容忍度概念,在动态社会网络中,智能体可以通过与邻居建立或中断联系来提高其收益。这个问题最初是通过观察在动态网络中运行的实验中的阻力或容忍度而介绍给作者的,他们已经开发了两个规则:最高奖励邻居规则和最高加权奖励规则。这些规则帮助代理评估它们的邻居并决定是否断开连接。他们通过允许代理与坏邻居保持一段时间的关系,在动态网络中引入了容忍的概念。在这项研究中,作者调查和定义了动态社会网络中的容忍现象,特别是两个规则。本文定义了一个数学模型来预测agent对坏邻居的容忍度,并确定影响其容忍度的因素。在定义了容差的一般版本之后,探讨了最优容差的概念,提供了容差可以作为影响网络效率和网络结构的工具的情况。
{"title":"Simulating Tolerance in Dynamic Social Networks","authors":"Kristen Lund, Yu Zhang","doi":"10.4018/jats.2011010105","DOIUrl":"https://doi.org/10.4018/jats.2011010105","url":null,"abstract":"This paper studies the concept of tolerance in dynamic social networks where agents are able to make and break connections with neighbors to improve their payoffs. This problem was initially introduced to the authors by observing resistance or tolerance in experiments run in dynamic networks under the two rules that they have developed: the Highest Rewarding Neighborhood rule and the Highest Weighted Reward rule. These rules help agents evaluate their neighbors and decide whether to break a connection or not. They introduce the idea of tolerance in dynamic networks by allowing an agent to maintain a relationship with a bad neighbor for some time. In this research, the authors investigate and define the phenomenon of tolerance in dynamic social networks, particularly with the two rules. The paper defines a mathematical model to predict an agent's tolerance of a bad neighbor and determine the factors that affect it. After defining a general version of tolerance, the idea of optimal tolerance is explored, providing situations in which tolerance can be used as a tool to affect network efficiency and network structure.","PeriodicalId":93648,"journal":{"name":"International journal of agent technologies and systems","volume":"158 1","pages":"52-68"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87263512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quasi-PSO Algorithm for Modeling Foraging Dynamics in Social Mammals 群居哺乳动物觅食动态建模的准粒子群算法
Pub Date : 2011-01-01 DOI: 10.4018/jats.2011010103
Marco Campennì, F. Cecconi
In this paper, the authors present a computational model of a fundamental social phenomenon in the study of animal behavior: the foraging. The purpose of this work is, first, to test the validity of the proposed model compared to another existing model, the flocking model; then, to try to understand whether the model may provide useful suggestions in studying the size of the group in some species of social mammals.
在本文中,作者提出了动物行为研究中一个基本社会现象的计算模型:觅食。本研究的目的是:首先,对比另一个已有的模型——群集模型,检验本文提出的模型的有效性;然后,试图了解该模型是否可以为研究某些社会哺乳动物物种的群体规模提供有用的建议。
{"title":"Quasi-PSO Algorithm for Modeling Foraging Dynamics in Social Mammals","authors":"Marco Campennì, F. Cecconi","doi":"10.4018/jats.2011010103","DOIUrl":"https://doi.org/10.4018/jats.2011010103","url":null,"abstract":"In this paper, the authors present a computational model of a fundamental social phenomenon in the study of animal behavior: the foraging. The purpose of this work is, first, to test the validity of the proposed model compared to another existing model, the flocking model; then, to try to understand whether the model may provide useful suggestions in studying the size of the group in some species of social mammals.","PeriodicalId":93648,"journal":{"name":"International journal of agent technologies and systems","volume":"44 1","pages":"27-38"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82536082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhanced Reputation Model with Forgiveness for E-Business Agents 基于宽恕的电子商务代理增强信誉模型
Pub Date : 2011-01-01 DOI: 10.4018/jats.2011010102
Radu Burete, A. Bădică, C. Bǎdicǎ, F. Moraru
Trust is a very important quality attribute of an e-service. In particular, the increasing complexity of the e-business environment requires the development of new computational models of trust and reputation for e-business agents. In this paper, the authors introduce a new reputation model for agents engaged in e-business transactions. The model enhances classic reputation models by the addition of forgiveness factor and the use of new sources of reputation information based on agents groups. The paper proposes an improvement of this model by employing the recent con-resistance concept. Finally, the authors show how the model can be used in an agent-based market environment where trusted buyer and seller agents meet, negotiate, and transact multi-issue e-business contracts. The system was implemented using JADE multi-agent platform and initially evaluated on a sample set of scenarios. The paper introduces the design and implementation of the agent-based system together with the experimental scenarios and results.
信任是电子服务非常重要的质量属性。特别是,电子商务环境日益复杂,需要为电子商务代理开发新的信任和声誉计算模型。本文提出了一种新的电子商务代理信誉模型。该模型通过添加宽恕因子和使用基于代理群体的新声誉信息源来增强经典声誉模型。本文采用最新的非电阻概念对该模型进行了改进。最后,作者展示了如何在基于代理的市场环境中使用该模型,在该环境中,受信任的买方和卖方代理会面、谈判和处理多问题电子商务合同。该系统使用JADE多代理平台实现,并在一组示例场景上进行了初步评估。本文介绍了基于agent的系统的设计与实现,并给出了实验场景和结果。
{"title":"Enhanced Reputation Model with Forgiveness for E-Business Agents","authors":"Radu Burete, A. Bădică, C. Bǎdicǎ, F. Moraru","doi":"10.4018/jats.2011010102","DOIUrl":"https://doi.org/10.4018/jats.2011010102","url":null,"abstract":"Trust is a very important quality attribute of an e-service. In particular, the increasing complexity of the e-business environment requires the development of new computational models of trust and reputation for e-business agents. In this paper, the authors introduce a new reputation model for agents engaged in e-business transactions. The model enhances classic reputation models by the addition of forgiveness factor and the use of new sources of reputation information based on agents groups. The paper proposes an improvement of this model by employing the recent con-resistance concept. Finally, the authors show how the model can be used in an agent-based market environment where trusted buyer and seller agents meet, negotiate, and transact multi-issue e-business contracts. The system was implemented using JADE multi-agent platform and initially evaluated on a sample set of scenarios. The paper introduces the design and implementation of the agent-based system together with the experimental scenarios and results.","PeriodicalId":93648,"journal":{"name":"International journal of agent technologies and systems","volume":"18 1","pages":"11-26"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78164671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Design of Multi Agent System for Resource Allocation and Monitoring 资源分配与监控的多智能体系统设计
Pub Date : 2011-01-01 DOI: 10.4018/jats.2011010101
M. S. Devi, Manish Arora
The objective of Resource Allocation and Monitoring System is to make the procedures involved in allocating fund resources to competing clients transparent so that deserving candidates get funds. Proactive and goal directed behaviour of agents make the system transparent and intelligent. This paper presents design of Multi Agent Systems for Resource Allocation and Monitoring using Agent Unified Modelling Language AUML and implementation in agent based development tool. At a conceptual level, three agents are identified with their roles and responsibilities. The identified agents, functionalities, and interactions are also included and results show that multi agent technology can be used for effective decision making for resource allocation and monitoring problem.
资源分配及监察制度的目的,是使分配基金资源给竞争客户的程序透明化,使有资格的候选人获得资金。代理的主动和目标导向行为使系统透明和智能。本文介绍了利用Agent统一建模语言AUML设计资源分配与监控的多Agent系统,并在基于Agent的开发工具中实现。在概念层面上,三个代理被确定为它们的角色和职责。结果表明,多智能体技术可用于资源分配和监控问题的有效决策。
{"title":"Design of Multi Agent System for Resource Allocation and Monitoring","authors":"M. S. Devi, Manish Arora","doi":"10.4018/jats.2011010101","DOIUrl":"https://doi.org/10.4018/jats.2011010101","url":null,"abstract":"The objective of Resource Allocation and Monitoring System is to make the procedures involved in allocating fund resources to competing clients transparent so that deserving candidates get funds. Proactive and goal directed behaviour of agents make the system transparent and intelligent. This paper presents design of Multi Agent Systems for Resource Allocation and Monitoring using Agent Unified Modelling Language AUML and implementation in agent based development tool. At a conceptual level, three agents are identified with their roles and responsibilities. The identified agents, functionalities, and interactions are also included and results show that multi agent technology can be used for effective decision making for resource allocation and monitoring problem.","PeriodicalId":93648,"journal":{"name":"International journal of agent technologies and systems","volume":"55 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72810426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
New Robot Revolution, Multi-Agency and the Machinic: Review of Gerald Raunig's A Thousand Machines 新机器人革命,多机构和机械:杰拉尔德·劳尼格的《一千台机器》述评
Pub Date : 2011-01-01 DOI: 10.4018/jats.2011010106
S. Collins
First, a couple of anecdotes: While I was working on a class lecture a few days ago in my office, a “flash mob” showed up on the quadrangle in front of my window and danced to their iPods for a while before dispersing. Flash mobs were (briefly) a concern for police and other authorities in places like Minsk (Shirky, 2008, p. 165), Philadelphia (Urbina, 2010) and elsewhere, where the alarmingly sudden presence of people loosely coupled through their text messaging or blogging triggered fears of anarchy. But, watching them dance, I remembered another, similar term: flash crowds—the sudden surge of internet traffic associated with, for example, a denial-of-service attack. The similarity is not just incidental—they appear to both derive, New Robot Revolution, Multi-Agency and the Machinic: Review of Gerald Raunig’s A Thousand Machines
先说几件轶事:几天前,当我在办公室准备一堂课时,一群“快闪族”出现在我窗前的四合院上,他们跟着ipod跳了一会儿舞,然后散开了。在明斯克(Shirky, 2008, p. 165)、费城(Urbina, 2010)和其他地方,快闪族(Flash暴徒)是警察和其他当局(短暂地)关注的问题,在这些地方,人们通过短信或博客松散地联系在一起,令人震惊地突然出现,引发了对无政府状态的恐惧。但是,看着他们跳舞,我想起了另一个类似的术语:闪电人群——互联网流量的突然激增,例如,与拒绝服务攻击有关。这种相似之处并非偶然——它们似乎都衍生出《新机器人革命》、《多机构》和《机械》:杰拉德·劳尼格《一千台机器》书评
{"title":"New Robot Revolution, Multi-Agency and the Machinic: Review of Gerald Raunig's A Thousand Machines","authors":"S. Collins","doi":"10.4018/jats.2011010106","DOIUrl":"https://doi.org/10.4018/jats.2011010106","url":null,"abstract":"First, a couple of anecdotes: While I was working on a class lecture a few days ago in my office, a “flash mob” showed up on the quadrangle in front of my window and danced to their iPods for a while before dispersing. Flash mobs were (briefly) a concern for police and other authorities in places like Minsk (Shirky, 2008, p. 165), Philadelphia (Urbina, 2010) and elsewhere, where the alarmingly sudden presence of people loosely coupled through their text messaging or blogging triggered fears of anarchy. But, watching them dance, I remembered another, similar term: flash crowds—the sudden surge of internet traffic associated with, for example, a denial-of-service attack. The similarity is not just incidental—they appear to both derive, New Robot Revolution, Multi-Agency and the Machinic: Review of Gerald Raunig’s A Thousand Machines","PeriodicalId":93648,"journal":{"name":"International journal of agent technologies and systems","volume":"39 1","pages":"69-75"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86544959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Issues in Mobile Agent Applications 移动代理应用程序中的安全问题
Pub Date : 2010-10-01 DOI: 10.4018/jats.2010100104
O. Ojesanmi
An autonomous mobile agent is an executing program that can migrate from machine to machine in a heterogeneous network under its own control. An agent can either follow a pre-assigned path on the network or determine its itinerary based on the data collected from the network. Facilities for highly dynamic movement of code and data enable a program to take advantage of the locality of data. It also allows one to optimize between the requirements of low bandwidth, high latency and disconnected network connections. This computing paradigm, which exploits code, data and state mobility, raises many new security issues that are quite different from conventional client/server systems. Agent servers that provide an execution environment for the agents to execute can be attacked by malicious agents. Similarly agents could be carrying sensitive information about their owners and should be protected from tampering by malicious hosts. The data collected by the agent from one host should also be protected from tampering by another host in the itinerary. In this paper, various security issues that arise in mobile agents applications were examined.
自主移动代理是一种执行程序,它可以在自己的控制下在异构网络中从一台机器迁移到另一台机器。代理可以遵循网络上预先分配的路径,也可以根据从网络收集的数据确定其行程。高度动态移动代码和数据的工具使程序能够利用数据的局部性。它还允许在低带宽、高延迟和断开网络连接的需求之间进行优化。这种利用代码、数据和状态可移动性的计算范式引发了许多新的安全问题,这些问题与传统的客户机/服务器系统截然不同。为代理提供执行环境的代理服务器可能会受到恶意代理的攻击。类似地,代理可能携带有关其所有者的敏感信息,应该保护它们不被恶意主机篡改。代理从一个主机收集的数据也应该被保护以免被行程中的另一个主机篡改。本文研究了移动代理应用中出现的各种安全问题。
{"title":"Security Issues in Mobile Agent Applications","authors":"O. Ojesanmi","doi":"10.4018/jats.2010100104","DOIUrl":"https://doi.org/10.4018/jats.2010100104","url":null,"abstract":"An autonomous mobile agent is an executing program that can migrate from machine to machine in a heterogeneous network under its own control. An agent can either follow a pre-assigned path on the network or determine its itinerary based on the data collected from the network. Facilities for highly dynamic movement of code and data enable a program to take advantage of the locality of data. It also allows one to optimize between the requirements of low bandwidth, high latency and disconnected network connections. This computing paradigm, which exploits code, data and state mobility, raises many new security issues that are quite different from conventional client/server systems. Agent servers that provide an execution environment for the agents to execute can be attacked by malicious agents. Similarly agents could be carrying sensitive information about their owners and should be protected from tampering by malicious hosts. The data collected by the agent from one host should also be protected from tampering by another host in the itinerary. In this paper, various security issues that arise in mobile agents applications were examined.","PeriodicalId":93648,"journal":{"name":"International journal of agent technologies and systems","volume":"45 1","pages":"39-55"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76005319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
International journal of agent technologies and systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1