Filters








24,598 Hits in 4.0 sec

Configuring of Supply Chain Networks Based on Constraint Satisfaction, Genetic and Fuzzy Game Theoretic Approaches [chapter]

Alexander V. Smirnov, Leonid B. Sheremetov, Nikolai Chilov, Jose Romero Cortes
2002 Knowledge and Technology Integration in Production and Services  
ACKNOWLEDGMENTS Partial support for this research work has been provided by the CONACyT, Mexico within the project 31851-A Models and Tools for Agent Interaction in Cooperative MAS and by the National  ...  Some examples were developed using software granted by ILOG Inc.  ...  Object oriented constraint networks are used for solving SCN configuration and resource allocation tasks using constraint satisfaction methodology.  ... 
doi:10.1007/978-0-387-35613-6_20 fatcat:csv2mcjykvdxtirvm66qc7gutq

Modelling secure multiagent systems

Haralambos Mouratidis, Paolo Giorgini, Gordon Manson
2003 Proceedings of the second international joint conference on Autonomous agents and multiagent systems - AAMAS '03  
This is, mainly, due to the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing stages.  ...  However, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system.  ...  It has been argued, "if agents are to realise their potential as a software engineering paradigm, then it is necessary to develop software engineering techniques that are specifically tailored to them"  ... 
doi:10.1145/860575.860713 dblp:conf/atal/MouratidisGM03 fatcat:tgnlbhhu4nfvzb4v35k6eh7dwe

Modelling secure multiagent systems

Haralambos Mouratidis, Paolo Giorgini, Gordon Manson
2003 Proceedings of the second international joint conference on Autonomous agents and multiagent systems - AAMAS '03  
This is, mainly, due to the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing stages.  ...  However, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system.  ...  It has been argued, "if agents are to realise their potential as a software engineering paradigm, then it is necessary to develop software engineering techniques that are specifically tailored to them"  ... 
doi:10.1145/860710.860713 fatcat:uo6izjnxwzgeni5pegkh5hn5vy

Agent-Mediated Integrative Negotiation for Retail Electronic Commerce [chapter]

Robert H. Guttman, Pattie Maes
1999 Lecture Notes in Computer Science  
Finally, we identify promising techniques (e.g., multi-attribute utility theory, distributed constraint satisfaction, and conjoint analysis) for implementing agent-mediated integrative negotiation.  ...  This paper analyzes these approaches from economic, behavioral, and software agent perspectives then proposes integrative negotiation as a more suitable approach to retail electronic commerce.  ...  Acknowledgements We would like to thank Alex Kleiner III, Fernanda Viegas, Natalia Marmasse, and Alexandros Moukas for their help with this paper.  ... 
doi:10.1007/3-540-48835-9_5 fatcat:qwljugvhyvg3liiixkgb32htl4

SECURE TROPOS: A SECURITY-ORIENTED EXTENSION OF THE TROPOS METHODOLOGY

HARALAMBOS MOURATIDIS, PAOLO GIORGINI
2007 International journal of software engineering and knowledge engineering  
One of the reasons is the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing stages.  ...  A description of the new concepts and modelling activities is given along with a discussion on how these concepts and modelling activities are integrated to the current stages of Tropos.  ...  The agent oriented software engineering paradigm presents a feasible approach for the integration of security into software engineering.  ... 
doi:10.1142/s0218194007003240 fatcat:2tpx7pl3ffgipkh4iyfmvm7w2y

Modeling car crash management with KAOS

Antoine Cailliau, Christophe Damas, Bernard Lambeau, Axel van Lamsweerde
2013 2013 3rd International Workshop on Comparing Requirements Modeling Approaches (CMA@RE)  
The overall produced model integrates the goal, object, agent, operation and behavior submodels of the system.  ...  Semi-formal and formal techniques complement each other for model construction, analysis and evolution.  ...  Agents are active system components playing some role in goal satisfaction; they include people, devices such as sensors and actuators, legacy software or software-to-be components.  ... 
doi:10.1109/cma-re.2013.6664180 fatcat:hpdlmu7awvfapj2gnlzgxcnr3y

A proposal for consolidated intentional modeling language

Joshua C. Nwokeji, Tony Clark, Balbir S. Barn
2013 Proceedings of the Second Workshop on Graphical Modeling Language Development - GMLD '13  
Our proposed solution is to combine these two languages into a consolidated modeling language using a Model Based Software Engineering (MBSE) language integration technique, in EMF-Ecore, and develop a  ...  Intentional modeling (IM) focuses on intentions and motivations of software systems rather than behaviours.  ...  Model Integration Approach Model integration techniques have been applied in [13] to design the so called unified goal oriented language (UGL).  ... 
doi:10.1145/2489820.2489826 fatcat:bga3yw76jfhlfd2hstjeka2rzi

A Multi-Agent Temporal Constraint Satisfaction System Based on Allen's Interval Algebra and Probabilities

Elhadi Shakshuki, André Trudel, Yiqing Xu
2007 International Journal of Information Technology and Web Engineering  
Many real-world problems can be viewed and represented as a constraint satisfaction problem (CSP). In addition, many of these problems are distributed in nature.  ...  Each PIA-Agent is independent and has sole control over its network.  ...  For example, Calisti and Neagu (2004) analyzed and discussed possible ways of integrating CSP and agent techniques.  ... 
doi:10.4018/jitwe.2007040102 fatcat:j4aztsealfdbxknflvfl7s5gmi

The i* Framework for Goal-Oriented Modeling [chapter]

Xavier Franch, Lidia López, Carlos Cares, Daniel Colomer
2016 Domain-Specific Conceptual Modeling  
Around this language, several analysis techniques have emerged, e.g. goal satisfaction analysis and metrics computation.  ...  Then, we implement this version and a concrete technique, goal satisfaction analysis based on goal propagation, using ADOxx.  ...  Acknowledgments This work has been partially funded by the Spanish funded project EOSSAC (TIN2013-44641-P) and the RISCOSS project, funded by the EC 7th Framework Programme FP7/2007-2013, agreement number  ... 
doi:10.1007/978-3-319-39417-6_22 fatcat:6nt3x6giqzgchdchdntvu3hqza

Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems [chapter]

H. Mouratidis, P. Giorgini
2009 Lecture Notes in Computer Science  
The consideration of security requirements in the development of multi-agent systems is a very difficult task.  ...  a pattern-based approach to transform security requirements to design, and (iii) a security attack scenarios approach to test the developed solution.  ...  We believe that the agent oriented software engineering paradigm presents a feasible approach for the integration of security to software engineering due to the appropriateness of agent oriented philosophy  ... 
doi:10.1007/978-3-642-04879-1_2 fatcat:olerr4uqrbafbl4m457irwtz7a

Integrating multi-agent negotiation to resolve constraints in fulfilling supply chain orders

Fu-ren Lin, You-yu Lin
2006 Electronic Commerce Research and Applications  
The results show that the integrated system outperforms the existing distributed constraint satisfaction algorithms in various demand patterns.  ...  The coordination of OFP among supply chain partners can be viewed as a distributed constraint satisfaction problem (DCSP).  ...  Metal Industry Research and Development Center.  ... 
doi:10.1016/j.elerap.2006.04.003 fatcat:eprd5zpqfbfxrk6ce2h4dwpdzi

Automated Completeness Check in KAOS [chapter]

Joshua C. Nwokeji, Tony Clark, Balbir Barn, Vinay Kulkarni
2014 Lecture Notes in Computer Science  
The contribution at hand is to provide an automated technique for checking the completeness and wellformed-ness of a requirements specification in KAOS language.  ...  KAOS is a popular and useful goal oriented requirements engineering (GORE) language, which can be used in business requirements modelling, specification, and analysis.  ...  Requirement is a type of goal that has a clear criteria for its satisfaction and are usually assigned to Software Agents, while Expectation has no clear criteria for its satisfaction and are assigned to  ... 
doi:10.1007/978-3-319-12256-4_14 fatcat:yokpgnz5ljaankx7yox6nkqfs4

Conflict Resolution in Resource Federation with Intelligent Agent Negotiation [chapter]

Wai-Khuen Cheng, Huah-Yong Ch
2012 Practical Applications of Agent-Based Technology  
Some constraints are resolved to increase the satisfaction of both intelligent agents during a conflict or dispute.  ...  ., 2009 , several applicable techniques are adopted in solving the conflict and dispute for integrative negotiation. These techniques are listed below. i.  ...  In an agent-based system, software agents with sufficient intelligence and autonomy can either work independently or coordinately with other agents to accomplish tasks and missions.  ... 
doi:10.5772/36189 fatcat:jyotxls2pbazfilk5y7slluiwq

Multiagent Design Architecture for Intelligent Synthesis Environment

A. Deshmukh, T. Middelkoop, A. Krothapalli, W. Shields, N. Chandra, C. A. Smith
2001 Journal of Aircraft  
the constraint satisfaction and search tool.  ...  Constraint Satisfaction and Search Tool The constraint satisfaction and search routine contains global knowledge of the system.  ... 
doi:10.2514/2.2778 fatcat:a6cecnhwn5d4be4y32ioyzmpzy

Constraints and Agents Confronting Ignorance

Peggy S. Eaton, Eugene C. Freuder, Richard J. Wallace
1998 The AI Magazine  
solution quality when the straint computation and software agents.  ...  and Wallace 1997 Mixed-initiative constraint-satisfaction problems Jackson and Havens 1995 Information and Internet Constraint Agents Constraint-based  ... 
doi:10.1609/aimag.v19i2.1368 dblp:journals/aim/EatonFW98 fatcat:3pwfd27uejg6dfwuhx3dwlhivm
« Previous Showing results 1 — 15 out of 24,598 results