Sciweavers

CIMCA
2008
IEEE
13 years 12 months ago
Web Services Composition: Mashups Driven Orchestration Definition
On the one hand, mashups are a new kind of web application built upon the composition of different resources in a user-friendly way. Tools based on such concepts focus on graphic ...
Sébastien Mosser, Franck Chauvel, Mireille ...
CIA
2008
Springer
13 years 12 months ago
Towards an Open Negotiation Architecture for Heterogeneous Agents
This paper presents the design of an open architecture for heterogeneous negotiating agents. Both the system level architecture as well as the architecture for negotiating agents a...
Koen V. Hindriks, Catholijn M. Jonker, Dmytro Tykh...
CIA
2008
Springer
13 years 12 months ago
A Formal Approach to Aggregated Belief Formation
Abstract. This paper introduces a formal method to aggregate over basic beliefs, in order to deduce aggregated or complex beliefs as often used in applications. Complex beliefs can...
Annerieke Heuvelink, Michel C. A. Klein, Jan Treur
CIA
2008
Springer
13 years 12 months ago
Towards a Monitoring Framework for Agent-Based Contract Systems
The behaviours of autonomous agents may deviate from those deemed to be for the good of the societal systems of which they are a part. Norms have therefore been proposed as a means...
Noura Faci, Sanjay Modgil, Nir Oren, Felipe Rech M...
CIA
2008
Springer
13 years 12 months ago
Incrementally Refined Acquaintance Model for Consortia Composition
This paper presents a specific contracting algorithm that contributes to the process of distributed planning and resource allocation in competitive, semi-trusted environments. The ...
Jan Doubek, Jirí Vokrínek, Michal Pe...
CIA
2008
Springer
13 years 12 months ago
Modeling Dynamics of Relative Trust of Competitive Information Agents
In order for personal assistant agents in an ambient intelligence context to provide good recommendations, or pro-actively support humans in task allocation, a good model of what t...
Mark Hoogendoorn, S. Waqar Jaffry, Jan Treur
CIA
2008
Springer
13 years 12 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
CIA
2008
Springer
13 years 12 months ago
Filter Allocation Using Iterative ECNP
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
Jan Tozicka, Stepán Urban, Magdalena Prokop...
ATAL
2008
Springer
13 years 12 months ago
Decentralised Structural Adaptation in Agent Organisations
Abstract. Autonomic computing is being advocated as a tool for maintaining and managing large, complex computing systems. Self-organising multi-agent systems provide a suitable par...
Ramachandra Kota, Nicholas Gibbins, Nicholas R. Je...
ATAL
2008
Springer
13 years 12 months ago
Using SOA Provenance to Implement Norm Enforcement in e-Institutions
In the last 10 years several approaches and technologies other than MAS (such as Web services and Grid computing) have emerged, with the support of the industry, providing their o...
Javier Vázquez-Salceda, Sergio Álvar...