This book represents the combined peer-reviewed proceedings of the Eight International Symposium on Intelligent Distributed Computing - IDC'2014, of the Workshop on Cyber Security and Resilience of Large-Scale Systems - WSRL-2014, and of the Sixth International Workshop on Multi-Agent Systems Technology and Semantics- MASTS-2014. All the events were held in Madrid, Spain, during September 3-5, 2014. The 47 contributions published in this book address several topics related to theory and applications of the intelligent distributed computing and multi-agent systems, including: agent-based data processing, ambient intelligence, collaborative systems, cryptography and security, distributed algorithms, grid and cloud computing, information extraction, knowledge management, big data and ontologies, social networks, swarm intelligence or videogames amongst others.
Author(s): David Camacho, Lars Braubach, Salvatore Venticinque, Costin Badica (eds.)
Series: Studies in Computational Intelligence 570
Edition: 1
Publisher: Springer International Publishing
Year: 2015
Language: English
Pages: 476
Tags: Computational Intelligence; Artificial Intelligence (incl. Robotics); Information Systems Applications (incl. Internet)
Front Matter....Pages 1-16
Front Matter....Pages 1-1
Low or No Cost Distributed Evolutionary Computation....Pages 3-4
Automated Algorithm Configuration: Advances and Prospects....Pages 5-5
Front Matter....Pages 7-7
Statistical Inference for Intelligent Lighting: A Pilot Study....Pages 9-18
How Musical Selection Impacts the Performance of the Interaction with the Computer....Pages 19-28
Detection of Distraction and Fatigue in Groups through the Analysis of Interaction Patterns with Computers....Pages 29-39
Lifestyle Recommendation System for Treating Malnutrition....Pages 41-46
Front Matter....Pages 47-47
Distributed Event Processing for Goal-Oriented Workflows....Pages 49-58
Agent Based Negotiation of Decentralized Energy Production....Pages 59-67
Models of Autonomy and Coordination: Integrating Subjective and Objective Approaches in Agent Development Frameworks....Pages 69-79
Distributed Runtime Verification of JADE Multiagent Systems....Pages 81-91
Front Matter....Pages 93-93
A Genetic Approach for Virtual Computer Network Design....Pages 95-105
Gene Expression Programming for Evolving Two-Dimensional Cellular Automata in a Distributed Environment....Pages 107-117
A Methodology to Develop Service Oriented Evolutionary Algorithms....Pages 119-125
Simulation of Bio-inspired Security Mechanisms against Network Infrastructure Attacks....Pages 127-133
Front Matter....Pages 135-135
Improving Grid Nodes Coalitions by Using Reputation....Pages 137-146
User-Centric Cloud Intermediation Services....Pages 147-153
Multi-agent Negotiation of Decentralized Energy Production in Smart Micro-grid....Pages 155-160
Towards Elastic Component-Based Cloud Applications....Pages 161-171
Front Matter....Pages 173-173
Mixed Clustering Methods to Forecast Baseball Trends....Pages 175-184
SACOC:A Spectral-Based ACO Clustering Algorithm....Pages 185-194
Front Matter....Pages 173-173
Anomalous Web Payload Detection: Evaluating the Resilience of 1-Grams Based Classifiers....Pages 195-200
Online Gamers Classification Using K-means....Pages 201-208
Front Matter....Pages 209-209
Semantic Information Fusion of Linked Open Data and Social Big Data for the Creation of an Extended Corporate CRM Database....Pages 211-221
Time-Frequency Social Data Analytics for Understanding Social Big Data....Pages 223-228
Modeling Open Accessibility Data of Public Transport....Pages 229-236
Front Matter....Pages 237-237
A Machine Learning Attack against the Civil Rights CAPTCHA....Pages 239-248
Regression from Distributed Data Sources Using Discrete Neighborhood Representations and Modified Stalked Generalization Models....Pages 249-258
On a Machine Learning Approach for the Detection of Impersonation Attacks in Social Networks....Pages 259-268
A Study of Machine Learning Techniques for Daily Solar Energy Forecasting Using Numerical Weather Models....Pages 269-278
AGGE: A Novel Method to Automatically Generate Rule Induction Classifiers Using Grammatical Evolution....Pages 279-288
Front Matter....Pages 289-289
Expansion Quality of Epidemic Protocols....Pages 291-300
Ontology and Rules-Based Model to Reason on Useful Contextual Information for Providing Appropriate Services in U-Healthcare Systems....Pages 301-310
Following the Problem Organisation: A Design Strategy for Engineering Emergence....Pages 311-317
Front Matter....Pages 319-319
Core Heuristics for Preference-Based Scheduling in Virtual Organizations of Utility Grids....Pages 321-330
Locality Aware Task Scheduling in Parallel Data Stream Processing....Pages 331-342
Front Matter....Pages 343-343
A Survey of Social Web Mining Applications for Disease Outbreak Detection....Pages 345-356
Social Tagging Analytics for Processing Unlabeled Resources:A Case Study on Non-geotagged Photos....Pages 357-367
2D-SocialNetworks:AWay to Virally Distribute Popular Information Avoiding Spam....Pages 369-375
The Effect of Topology on the Attachment Process in Trust Networks....Pages 377-382
Front Matter....Pages 383-383
Data Fusion in a Multi Agent System for Person Detection and Tracking in an Intelligent Room....Pages 385-394
Front Matter....Pages 383-383
Emergence of Norms in Multi-agent Societies: Influence of Population Size and Topology....Pages 395-401
From Intentions to Plans: A Contextual Planning Guidance....Pages 403-413
Front Matter....Pages 415-415
A Parallel and a Distributed Implementation of the Core Paths Graph Algorithm....Pages 417-426
A Semantic Driven Approach for Requirements Verification....Pages 427-436
An Hybrid Architecture to Enhance Attacks Detection on IT infrastructure....Pages 437-442
A View-Based Acces Control Model for EHR Systems....Pages 443-452
Resilient Semantic Sensor Middleware....Pages 453-463
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study....Pages 465-474
Back Matter....Pages 475-476