This book constitutes the refereed proceedings of the First International Symposium on Agent and Multi-Agent Systems - Technologies and Applications, KES-AMSTA 2007, held in Wroclaw, Poland in May/June 2007. China in November 2006.
The 110 revised papers presented were carefully reviewed and selected from 464 submissions and contain 4 papers from the doctoral track, and 38 papers from 3 special sessions. The papers are organized in topical sections representing the following conference tracks: methodological aspects of agent systems, agent-oriented Web applications, mobility aspects of agent systems and ontology management, multi-agent resource allocation, negotiating agents, agents for network management, agent approaches to robotic systems, market agents and other applications; the doctoral track; special sessions on mobile agent application and its development, agent on networked media and its applications on next-generation convergence network, as well as on intelligent and secure agent for digital content management.
Author(s): Adam Grzech
Series: Lecture Notes in Computer Science - Lecture Notes Artificial Intelligence
Publisher: Springer
Year: 2007
Language: English
Pages: 1065
Front Matter......Page 1
Preface......Page 4
Symposium Organization......Page 6
International Program Committee......Page 8
Table of Contents......Page 11
001 On the Integration of Agent-Based and Mathematical Optimization Techniques......Page 20
Conclusions......Page 0
Introduction......Page 30
Agent Service, Service of Agent and Service of Service......Page 31
Agent Service Abstract Model......Page 32
Agent Service-Based Integration Architecture......Page 33
Developing Agent Service Problem-Solving Ontology......Page 34
Agent Service Interface Design......Page 35
Implementation Strategy — Multiagent + Web Services......Page 36
Case Study and Evaluation......Page 38
References......Page 39
Introduction......Page 40
Architecture......Page 41
Creation and Residence......Page 42
Description of Communication Framework......Page 43
Implementation Details......Page 45
Physical Layer and Its Reliability......Page 46
Concluding Remarks......Page 47
References......Page 49
004 Pr SH - A Belief Description Logic......Page 50
005 Reinforcement Learning on a Futures Market Simulator......Page 61
006 The Effects of Agent Synchronization in Asynchronous Search Algorithms......Page 72
007 Modelling Social Attitudes of Agents......Page 82
Introduction......Page 92
Agents’ Communication Graph......Page 94
Modeling Agents’ Initial Semantic Net......Page 95
Evolution of Individual Semantic Nets......Page 96
Semantic Negotiation......Page 97
Tracking System Properties......Page 98
Conclusions and Future Work......Page 99
References......Page 100
Introduction......Page 101
Software Components......Page 102
Proposal......Page 103
Experiments......Page 107
References......Page 109
Multiagent Systems Specification Methodologies......Page 111
MASINA: MultiAgent Systems in Automation......Page 113
Intelligence Model......Page 114
Coordination Model......Page 116
Communication Model......Page 117
Previous MASINA Applications......Page 118
References......Page 119
Introduction......Page 121
Route Choice and Traffic Information......Page 122
Stochastic Process Model for Daily Travel Pattern......Page 123
Solution Algorithm......Page 124
Numerical Example......Page 125
Results......Page 126
References......Page 129
012 Using Data Mining Algorithms for Statistical Learning of a Software Agent......Page 130
013 Expressivity of STRIPS-Like and HTN-Like Planning......Page 140
014 Implementation and Performance Evaluation of the Agent-Based Algorithm for ANN Training......Page 150
Introduction......Page 160
FIPA Discovery Middleware......Page 161
System Architecture......Page 162
Service Message Request and Response......Page 163
Implementation......Page 165
Conclusion and Future Work......Page 167
References......Page 168
Introduction......Page 169
Design of Fast TCP......Page 170
Test in Real Internet Environment......Page 171
Test in Real Internet with Intentional Packet Drops......Page 174
Conclusion......Page 176
References......Page 177
Introduction......Page 178
Paraconsistent, Paracomplete, and Non-alethic Logics......Page 179
The Paraconsistent Multimodal Logics M$tau$......Page 180
Semantical Analysis: Kripke Models......Page 182
Soundness and Completeness......Page 185
References......Page 186
018 Consensus-Based Evaluation Framework for Cooperative Information Retrieval Systems......Page 188
Introduction......Page 198
Framework of First Order Conflicting Agents......Page 201
Second Order of Conflict, Self-conflict, and Irrationality......Page 203
References......Page 207
020 Stratified Multi-agent HTN Planning in Dynamic Environments......Page 208
Introduction......Page 218
A Customer Measurable QoS Model......Page 219
WSrep Parameters......Page 220
The Credibility Model......Page 221
The Reputation Model......Page 222
Experimentation......Page 223
Related Work......Page 225
References......Page 226
Introduction......Page 228
Usability and Accessibility with Mobile Agents......Page 229
Performance Evaluation of Web Information Access......Page 231
Implementation and Empirical Results with User-Group......Page 234
References......Page 236
Introduction......Page 238
Prediction Model......Page 239
Update Agent......Page 243
Experimental Setup......Page 244
Conclusions......Page 246
References......Page 247
Introduction......Page 248
Related Work......Page 249
System Architecture......Page 250
Path Combining Module......Page 252
Query Translation Module......Page 253
Performance Evaluation......Page 254
Comparison of Search Speeds of PathFinder(p)......Page 255
References......Page 256
Introduction......Page 258
System Architecture......Page 260
The Hybrid EPG Agent System......Page 261
Web Page Retrieval Module......Page 262
Parsing Module......Page 263
Implementation of the Hybrid EPG Agent System......Page 264
Conclusions......Page 265
References......Page 266
026 Formal Modeling of Agent-Based English Auctions Using Finite State Process Algebra......Page 267
Introduction......Page 277
Filtering Methods......Page 278
Hybrid and Other Recommendation Approaches......Page 280
Artificial Immune Systems (AIS)......Page 281
Results......Page 283
Summary......Page 284
References......Page 285
Introduction......Page 286
Multi-Agent System......Page 287
Geospatial Ontologies......Page 290
Architecture of the Application......Page 291
Implementation of the Prototype......Page 292
Results of Retrieving Process of Geospatial Data......Page 294
Conclusions......Page 295
References......Page 296
Introduction......Page 297
General Overview......Page 298
Detailed Description of System Components......Page 300
WING Agent......Page 302
Conclusions and Future Work......Page 305
References......Page 306
Introduction......Page 307
Trust to Authors......Page 308
Personal Web of Trust......Page 309
Agent Trust......Page 310
Document Rank and Authorship......Page 311
Agent Communication......Page 312
Scenario Example......Page 314
References......Page 315
Introduction......Page 317
WPKI......Page 319
Mobile Agent......Page 321
Fair Non-repudiation Protocol with Timeliness......Page 322
Security of Non-repudiation Protocols......Page 324
References......Page 325
Introduction......Page 327
Neuro-fuzzy Classification......Page 328
Multi-agent Framework for Location-Based Service......Page 329
Multi-agents Processing Data Compression......Page 330
Data Compression Using Neuro-fuzzy Classifier......Page 331
Experiment Evaluation......Page 332
Performance Measures......Page 333
Result......Page 334
References......Page 336
033 eMARP - Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection......Page 337
Introduction......Page 347
Rule Base Fuzzy Cognitive Maps Profile......Page 348
Ontology Formal Model......Page 349
Ontology Design......Page 350
Ontology Agent Development......Page 352
Ontology Agent Deployment......Page 353
Outcomes and Evaluation......Page 354
References......Page 356
Introduction......Page 357
Literature Review: Ontology Inference Engines......Page 358
Evaluation Methodology......Page 359
Query Response Time......Page 360
Query Completeness......Page 361
Dynamic Endurance......Page 362
Overall Performance Evaluation......Page 363
Conclusion......Page 364
References......Page 365
Introduction......Page 367
Load Balancing in Multi-Agent Systems......Page 368
The Working Principles......Page 369
Experiment Configuration......Page 371
Load Balance......Page 373
Related Experiments......Page 374
References......Page 375
Introduction......Page 377
QoS Control Algorithm......Page 378
Congestion Control Algorithm......Page 379
Simulation Experiments......Page 381
References......Page 382
038 A Resource Discovery Method Based on Multi-agents in P2P Systems......Page 383
Introduction......Page 394
Related Works......Page 395
Principle of Data Distribution......Page 396
The Proposed Multi-agent Model......Page 397
Data Storage......Page 398
Data Splitting......Page 400
Experimental Evaluation......Page 401
References......Page 403
040 Semantic Data Integration in P2P Environment Using Schema Mappings and Agent Technology......Page 404
Problem Description......Page 414
Centralized and Distributed Power Structures......Page 415
Centralized Collaborator......Page 416
Distributed Collaborator......Page 417
ASMCR: An Open Constraint Optimisation System......Page 418
FieldExchange: Resource Balancing with iOpt......Page 420
Results......Page 421
Conclusions......Page 422
References......Page 423
Agent, Multi-agent Systems and Organizational Modeling......Page 424
Cellular Networks and Channel Allocation Strategies......Page 425
Network Operation......Page 426
The Proposed Multi-agent System......Page 427
Experimental Results......Page 431
References......Page 433
Introduction......Page 435
General Structure Design of ANeP......Page 436
Multi-attribute Negotiation Model in ANeP......Page 437
Multi-attribute Negotiation Process in ANeP......Page 439
Application Design......Page 441
References......Page 443
044 A Model for Informed Negotiating Agents......Page 445
045 Power in Norm Negotiation......Page 455
046 Quantitative Analysis of Single-Level Single-Mediator Multi-agent Systems......Page 466
047 Software Agent Negotiation for Service Composition......Page 475
048 A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture......Page 485
049 An Agent System for Bandwidth Allocation in Reservation-Based Networks Using Evolutionary Computing and Vickrey Auctions......Page 495
Introduction......Page 505
Network Traffic Anomalies and Intrusion Detection......Page 506
Evaluation of Network Traffic Anomalies......Page 507
Traffic Statistics......Page 509
Subjective Nature of Anomaly Detection......Page 510
Network Traffic Anomaly Level Assessment......Page 511
Applications......Page 512
Conclusions and Future Work......Page 513
References......Page 514
051 An Algorithm for Loopless Optimum Paths Finding Agent System and Its Application to Multimodal Public Transit Network......Page 515
Introduction......Page 525
Channel Impulse Response......Page 526
Channel Parameter Measurement......Page 527
References......Page 530
Introduction......Page 531
Statistical Model Using Queuing Theory......Page 532
Relation Between the Number of Hopping Channels and the Number of Serviced Users in the FH System......Page 533
The Relation Between the Number of Channels and the Number of Serviced Users in the LBT......Page 534
Calculation of Required Channel Numbers for FH and LBT......Page 535
References......Page 537
054 Verification of Mobile Agent Network Simulator......Page 539
Introduction......Page 549
Analyses......Page 550
Detailed Design and Implementation......Page 552
Practice......Page 554
Conclusions......Page 555
References......Page 556
Introduction......Page 558
Radial Basis Function Network......Page 560
Stability and Robustness......Page 562
Experimental Results......Page 564
Conclusion......Page 566
References......Page 567
057 Saving Energy Consumption of Multi-robots Using Higher-Order Mobile Agents......Page 568
Control Architecture......Page 578
Reactive and Sequencing Layer......Page 579
Deliberative Layer......Page 580
Mixed-Initiative Control......Page 584
Experiments......Page 585
References......Page 586
059 Remarks on Behaviours Programming of the Interactive Therapeutic Robot Koala Based on Fuzzy Logic Techniques......Page 587
Introduction......Page 597
Assumptions......Page 598
Notations......Page 599
Knowledge Base......Page 600
Knowledge Generation......Page 601
Decision Problem......Page 602
Knowledge Base Representation......Page 603
Example of Schedules Design......Page 604
Admissible Solutions......Page 605
References......Page 606
Introduction......Page 607
Directory Facilitator......Page 608
Existing Service Discovery Approaches......Page 609
Context Manager......Page 610
Service Matching Module......Page 612
Implementation......Page 613
References......Page 614
Introduction......Page 616
The TAC SCM Game......Page 617
The CrocodileAgent......Page 618
Negotiation of Supply Contracts......Page 619
Bidding for Customer Orders......Page 620
TAC SCM 2005 Competition and Controlled Experiments......Page 622
Conclusions and Future Work......Page 624
References......Page 625
Introduction......Page 626
Literature Review......Page 627
Architecture of the System......Page 628
An Illustrative Application......Page 631
Conclusion......Page 633
References......Page 634
064 Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting......Page 635
Introduction......Page 645
Medical Applications......Page 646
Current Research and Development......Page 647
Trend Evaluation......Page 648
Automated Knowledge Acquisition......Page 649
Disease Treatment and Monitoring Knowledge Ontology......Page 650
References......Page 652
066 Remote Control Multi-Agent System for u-Healthcare Service......Page 655
Introduction......Page 664
The Proposed Method......Page 665
Computation of Noise Model Analyzing Histogram......Page 666
Detection of Moving Blocks......Page 669
Experimental Results......Page 670
Conclusions......Page 672
References......Page 673
Introduction......Page 674
Architecture of the Multi-Agent System......Page 675
Real Time Self-organising Database......Page 679
Concluding Remarks......Page 682
References......Page 683
069 Water Floating Self-assembling Agents......Page 684
070 Failure Detection Service for Large Scale Systems......Page 694
Introduction......Page 704
Problem Description......Page 705
Hypotheses......Page 706
Solving Process......Page 707
Exchanged Messages......Page 708
Experimental Results......Page 709
Conclusion......Page 711
References......Page 712
Introduction......Page 713
Concept of Parallel Comparing the Sequence......Page 714
Multi-agent Architecture as Communication Schema......Page 715
DCDP Algorithm......Page 716
Client Code Description......Page 718
Node Code Description......Page 719
Empirical Evaluation......Page 720
References......Page 721
Related Work......Page 723
Converting Patching Agent......Page 725
Simulation and Performance Evaluation......Page 727
References......Page 729
Introduction......Page 730
Related Works for WSNs......Page 731
Setup Phase......Page 733
Organization Phase......Page 734
Maintenance Phase......Page 735
Simulation Environment......Page 736
Simulation Results and Analysis......Page 737
References......Page 738
Introduction......Page 740
Mobile Agent System......Page 741
Mobile Agent Lifecycle......Page 742
Milestone for the Progress Management......Page 745
References......Page 746
076 An Agent Environment for Contextualizing Folksonomies in a Triadic Context......Page 747
Introduction......Page 757
Overview of the Knowledge Discovery Agent and Bit-Map......Page 758
Bit-Map Based Routing Protocol......Page 760
Verification of Route Discovery......Page 763
References......Page 765
Introduction......Page 766
Related Work......Page 767
Mobile Collaboration Framework Architecture......Page 768
The Interactions of Component......Page 769
Healthcare Application......Page 770
Definition of Healthcare Application Components......Page 771
References......Page 774
Introduction......Page 776
An Overview of RFID Middlewares......Page 777
Policies of Mobile Agents Based Load Balancing......Page 778
Load Gathering Agent (LGA)......Page 779
RFID Middleware Load Balancing Agent (RLBA)......Page 780
Conclusion and Future Work......Page 782
References......Page 783
Introduction......Page 784
ISO/IEC 15408 (Common Criteria, CC)......Page 785
Theory......Page 787
Security Profile Lifecycle......Page 788
Milestone for the Progress Management......Page 790
Calculation of Defect Removal Efficiency......Page 791
References......Page 792
Introduction......Page 794
Robot Mixed Sorting Scheduler......Page 795
Configuration of Robot Agent System......Page 796
Server Controller......Page 797
Configuration of Robot Agent System......Page 799
Load Balancing Algorithm of System......Page 800
Implementation and Evaluation......Page 801
Conclusion......Page 802
References......Page 803
Introduction......Page 804
Social Knowledge Activities......Page 805
Architecture......Page 807
Enabling Social Collaboration and Authoring......Page 809
Tag-Based Search......Page 810
Enhancing Semantics......Page 811
References......Page 812
Introduction......Page 814
Related Works......Page 815
Neuro-fuzzy Classification......Page 816
Components of the Multi-agents......Page 817
Data Mining Model for Diagnosis Support......Page 819
Result......Page 821
Conclusion......Page 822
References......Page 823
084 Agent-Based Approach to Distributed Ensemble Learning of Fuzzy ARTMAP Classifiers......Page 824
Introduction......Page 834
Motivations......Page 835
System Architecture......Page 836
Use Case-Scenario and Evaluations......Page 838
Obtaining Base-Line Data Prior to Actual Deployment......Page 839
Evaluations and Testing......Page 840
Conclusion and Recommendations......Page 842
References......Page 843
086 Business Model and Comparasion of SW Source Code vs. Digital License for IPRs......Page 844
087 PKG-MIB - Private-Mib for Package-Based Linux Systems in a Large Scale Management Domain......Page 852
088 Performance of TPR -Trees for Predicting Future Positions of Moving Objects in U-Cities......Page 860
Introduction......Page 870
Design of an Integrated Positioning System......Page 871
Outdoor Positioning......Page 872
Indoor Positioning......Page 873
Experiments for Outdoor Positioning......Page 874
Experiments of Indoor Positioning......Page 875
References......Page 876
Introduction......Page 878
Indirect DiffServ Model for SIP in Broadband Access Networks......Page 879
Indirect DiffServ Support for QoS-Enabled SIP......Page 880
Indirect DiffServ Support for Assured-QoS SIP......Page 881
Indirect DiffServ Support for Enabled-QoS SIP......Page 882
Inter-layer Mapping of QoS Attributes......Page 883
Conclusion......Page 884
References......Page 885
Introduction......Page 886
The Mobile Agents in Ubiquitous Networks......Page 887
The Location Detection......Page 888
Simulation Result......Page 891
Conclusion......Page 892
References......Page 893
Introduction......Page 894
The Problem of Previous System......Page 895
Jini Network Technology......Page 896
Definition of Methods for the IAs......Page 897
Home Messenger Agent......Page 898
Information Appliance Manager Agent......Page 900
References......Page 901
Introduction......Page 903
Methods of a Load Balancing Test......Page 904
Data Expression and Calculation......Page 905
Configuration of a Test Module......Page 908
References......Page 910
Introduction......Page 911
Question Answering Systems......Page 912
Jini Network Technology......Page 913
The Client Browser......Page 914
The Home Server......Page 915
Information Appliance Manager Agent......Page 917
References......Page 918
Introduction......Page 920
Hypothesis and Analysis Method......Page 921
Data Collection and Analysis......Page 923
Future Application......Page 926
Conclusion......Page 927
References......Page 928
Introduction......Page 929
The Intelligent Diversity Scheme for Accurate Positioning of Mobile Agents......Page 930
Simulation Result......Page 934
References......Page 935
Introduction......Page 937
Introduction of CC1020......Page 938
Programming for Operation of CC1020......Page 939
Interfaces Between MCU, W3100A and RTL8201......Page 941
Programming for MCU......Page 942
Experiment and Performance......Page 944
References......Page 945
Introduction......Page 947
Web Service Composition Model......Page 948
Proposed Framework......Page 951
Extended Framework......Page 952
Process......Page 954
Conclusion......Page 955
References......Page 956
099 Traffic Signal Planning Using a Smart Agent System......Page 957
Introduction......Page 967
Problems and Improvement Schemes of Client-Server System with Security Model......Page 968
Problems and Improvement Schemes of Client-Server System with Security Model......Page 969
Protocol Design of Security Agent System Named NMAP......Page 970
Conclusion......Page 973
References......Page 974
Introduction......Page 975
Automated Signature Generation Engine......Page 976
Rule Generation for Payload Field......Page 977
Test Data......Page 979
New Signature Generation Test......Page 980
Conclusion......Page 981
References......Page 982
Introduction......Page 983
Item Repository......Page 984
Data Conversion Agents Process......Page 985
Evaluation of Performance......Page 988
References......Page 989
Introduction......Page 991
Decision Tree in Games......Page 992
Elementary Game-Agents and Improved Game-Agents......Page 993
Dynamic-FSM Method Using Player’s Gaming Data......Page 994
FSMs for Game-Agents......Page 995
Modeling Players with FSMs......Page 996
Experiment......Page 997
Conclusion and Future Works......Page 999
References......Page 1000
104 A Location-Aware Error Control Scheme of Route Multicast for Moving Agents......Page 1001
Introduction......Page 1009
Blurring Process and Image Edge Characteristic......Page 1010
Image Defocus Blur and Manual Blur......Page 1011
Edge Preserving Smoothing Filtering Reveals Manual Blur Boundary......Page 1012
Blur Detection Using Mathematical Morphology......Page 1013
Experimental Results......Page 1015
References......Page 1016
Introduction......Page 1018
Re-encryption Based Schemes......Page 1019
Efficient Authentication Protocol......Page 1020
Security Analysis......Page 1023
References......Page 1024
107 A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain......Page 1026
Introduction......Page 1036
The Concepts and Technologies of Virtual Enterprise......Page 1037
Suggestion of Virtual Enterprise DSF Model......Page 1039
Empirical Study to Extract Weights Per CSFs......Page 1040
Proposal for Ubiquitous Virtual Enterprise Reference Model......Page 1042
References......Page 1044
Introduction......Page 1046
Proposed Method......Page 1047
Experimental Results......Page 1051
Conclusion......Page 1052
References......Page 1053
Introduction......Page 1054
Review of Reinforcement Learning......Page 1055
Traffic, Routing and Model Configuration......Page 1056
Results......Page 1059
Conclusion......Page 1060
References......Page 1061
Back Matter......Page 1062