Sciweavers

1676 search results - page 306 / 336
» Describing Software Architecture with UML
Sort
View
E4MAS
2006
Springer
15 years 8 months ago
Exploiting the Environment for Coordinating Agent Intentions
One large and quite interesting family of MAS applications is characterized (1) by their large scale in terms of number of agents and physical distribution, (2) by their very dynam...
Tom Holvoet, Paul Valckenaers
HICSS
2000
IEEE
124views Biometrics» more  HICSS 2000»
15 years 8 months ago
An Empirical Study of Distribution based on Voyager: A Performance Analysis
The paper describes the model, implementation and experimental evaluation of a distributed Kohonen Neural Network application (Kohonen Application). The aim of this research is to...
Sérgio Viademonte, Frada Burstein, Fá...
ATAL
2008
Springer
15 years 6 months ago
Goals in agent systems: a unifying framework
In the literature on agent systems, the proactive behavior of agents is often modeled in terms of goals that the agents pursue. We review a number of commonly-used existing goal t...
M. Birna van Riemsdijk, Mehdi Dastani, Michael Win...
ATAL
2008
Springer
15 years 6 months ago
LS/ABPM - an agent-powered suite for goal-oriented autonomic BPM
In this paper we shortly describe the Living Systems Autonomic Business Process Management (LS/ABPM) software product. LS/ABPM is an integrated environment, based on J2EE, Eclipse...
Giovanni Rimassa, Martin E. Kernland, Roberto Ghiz...
INFOSCALE
2007
ACM
15 years 6 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü