{"title":"Management of MAS by Means of Automated Reasoning in the Role Model","authors":"O. Kazík, Roman Neruda","doi":"10.3233/978-1-60750-818-2-309","DOIUrl":"https://doi.org/10.3233/978-1-60750-818-2-309","url":null,"abstract":"","PeriodicalId":193688,"journal":{"name":"Software Agents, Agent Systems and Their Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122273522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Jadex Active Components Framework - BDI Agents for Disaster Rescue Coordination","authors":"L. Braubach, A. Pokahr","doi":"10.3233/978-1-60750-818-2-57","DOIUrl":"https://doi.org/10.3233/978-1-60750-818-2-57","url":null,"abstract":"In this chapter the Jadex framework is presented that aims at supporting the construction of distributed and concurrent applicatio ns. Main conceptual entity in Jadex is an active component that combines properties of a gents with software components in order to strengthen the software technical me ns for developing applications. The conceptual foundations of Jadex as well the advantages of active components will be described in a practical way by using a dis ster management scenario as a running example. Concretely, the notions of vi rtual environment, active components as well as BDI agents are introduced to show h ow a simulation scenario can be built, in which different kinds of rescue for ces are coordinated to handle disasters in a cooperative way.","PeriodicalId":193688,"journal":{"name":"Software Agents, Agent Systems and Their Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132670564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Bǎdicǎ, S. Ilie, M. Kamermans, G. Pavlin, A. Penders, Mihnea Scafes
{"title":"Multi-Agent Systems, Ontologies and Negotiation for Dynamic Service Composition in Multi-Organizational Environmental Management","authors":"C. Bǎdicǎ, S. Ilie, M. Kamermans, G. Pavlin, A. Penders, Mihnea Scafes","doi":"10.3233/978-1-60750-818-2-286","DOIUrl":"https://doi.org/10.3233/978-1-60750-818-2-286","url":null,"abstract":"This chapter discusses an efficient solution to contemporary situation assessment problems found in environmental management applications. The targeted problems are inherently complex and require processing of large quantities of heterogeneous information by using rich domain knowledge dispersed through multiple organizations. We assume a collaborative solution based on the Dynamic Process Integration Framework, which supports systematic encapsulation of processing services, including human experts. The encapsulation allows dynamic composition of heterogeneous processing services using advanced self-configuration mechanisms for optimal selection of service providers. Self-configuration is based on a framework for development of cooperative multi-issue one-to-many service negotiations. The framework allows the definition of: negotiation protocols, negotiation subjects composed of multiple negotiation issues, properties of negotiation issues, deal spaces, and utility functions of participant stakeholders. We show how this framework can be used for dynamic composition of workflows spanning multiple organizations in a disaster management information system.","PeriodicalId":193688,"journal":{"name":"Software Agents, Agent Systems and Their Applications","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132857939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Agent Systems in E-Health Territorial Emergencies","authors":"Giacomo Cabri","doi":"10.3233/978-1-60750-818-2-245","DOIUrl":"https://doi.org/10.3233/978-1-60750-818-2-245","url":null,"abstract":"","PeriodicalId":193688,"journal":{"name":"Software Agents, Agent Systems and Their Applications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134351015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SillyNegoBot Architecture","authors":"Sylwia Polberg","doi":"10.3233/978-1-60750-818-2-323","DOIUrl":"https://doi.org/10.3233/978-1-60750-818-2-323","url":null,"abstract":"Note from the author: the SillyBot is a bot playing the Diplomacy game(Callhamer, 2000) at a 0 strategy level. It is created in the dip framework (Fabregues & Sierra, Dipgame). The SillyNegoBot is its successor aiming for the level 1 (Fabregues & Sierra, Testbed for Multiagent Systems) and here we will describe its model and purpose behind it. This document requires prior knowledge of the language and idea of the Diplomacy game.","PeriodicalId":193688,"journal":{"name":"Software Agents, Agent Systems and Their Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132818580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Domanski, Radoslaw Dziadkiewicz, M. Ganzha, A. Gab, M. M. Mesjasz, M. Paprzycki
{"title":"Implementing GliderAgent - an agent-based decision support system for glider pilots","authors":"J. Domanski, Radoslaw Dziadkiewicz, M. Ganzha, A. Gab, M. M. Mesjasz, M. Paprzycki","doi":"10.3233/978-1-60750-818-2-222","DOIUrl":"https://doi.org/10.3233/978-1-60750-818-2-222","url":null,"abstract":"The aim of this chapter is to discuss practical issues encountered when a skeleton of the GliderAgent—a multi-agent system supporting glider pilots in various navigation and pilotage scenarios—was implemented. The GliderAgent implementation integrates two agent environments discussed in other chapters of this book (Jade and MAPS), as well as the XCsoar pilotage software, and the OpenStreetMaps GIS system. In addition to presenting the basic design of the GliderAgent system, the technical issues solved during its implementation are discussed. Finally, examples of implemented capabilities are illustrated.","PeriodicalId":193688,"journal":{"name":"Software Agents, Agent Systems and Their Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131063119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Jakob, P. Volf, Eduard Semsch, D. Pavlícek, M. Pechoucek
{"title":"Agent-based Control for Multi-UAV Information Collection","authors":"M. Jakob, P. Volf, Eduard Semsch, D. Pavlícek, M. Pechoucek","doi":"10.3233/978-1-60750-818-2-203","DOIUrl":"https://doi.org/10.3233/978-1-60750-818-2-203","url":null,"abstract":"","PeriodicalId":193688,"journal":{"name":"Software Agents, Agent Systems and Their Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116299352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and Anonymity in Agent Systems","authors":"R. Leszczyna, Igor Kotenko","doi":"10.3233/978-1-60750-818-2-157","DOIUrl":"https://doi.org/10.3233/978-1-60750-818-2-157","url":null,"abstract":"Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing to traditional environments. Apart of all the threats which face the latter, there are attacks specific to agent environments. The chapter considers issues of agent security, anonymity and untracebility and outlines the main threats to agent systems and existing protection methods.","PeriodicalId":193688,"journal":{"name":"Software Agents, Agent Systems and Their Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114254252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Sensor Networks and Software Agents","authors":"M. Essaaidi, G. Fortino","doi":"10.3233/978-1-60750-818-2-85","DOIUrl":"https://doi.org/10.3233/978-1-60750-818-2-85","url":null,"abstract":"","PeriodicalId":193688,"journal":{"name":"Software Agents, Agent Systems and Their Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123664100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Agents for Computer Network Security","authors":"Igor Kotenko, R. Leszczyna","doi":"10.3233/978-1-60750-818-2-260","DOIUrl":"https://doi.org/10.3233/978-1-60750-818-2-260","url":null,"abstract":"The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent Malware Simulator (MAlSim). The chapter sketches the above agent-based systems and analyses advantages of applying multi-agent technologies in computer network security area.","PeriodicalId":193688,"journal":{"name":"Software Agents, Agent Systems and Their Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125599282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}