Filters








39 Hits in 2.8 sec

Towards Adaptive Workflow Enactment Using Multiagent Systems

Paul A. Buhler, Jos� M. Vidal
2005 Journal of Special Topics in Information Technology and Management  
The redesigned systems will likely employ some form of workflow management system. Workflow management systems exactly enact business processes described in a process description language.  ...  We propose that workflow description languages and their associated design tools can be used to specify a multiagent system.  ...  Most closely related to our vision of using contemporary BPM tools and Web services for multiagent systems design is the work described in [28] .  ... 
doi:10.1007/s10799-004-7775-2 fatcat:uhopghwkabct3giv5wowdh3yvq

Multigate Communication Network for Smart Grid

Hamid Gharavi, Bin Hu
2011 Proceedings of the IEEE  
The MAC address of the DAP is employed as the unique identification of the corresponding routing trees.  ...  The root announcement allows proactive routing towards each meter (MSAP) in the residential area.  ... 
doi:10.1109/jproc.2011.2123851 fatcat:7cdsicmh2fhjppbv6g7j4j6tgq

Using Web Technologies for Supply Chain Management [chapter]

Marincas Delia, Voicila Cristi
2011 Supply Chain Management - Pathways for Research and Practice  
In order to be competitive, they have to employ new strategies based on new technologies.  ...  We consider that multiagent systems together with web technologies can automate, connect and optimize SC processes.  ... 
doi:10.5772/22374 fatcat:jhpwrimxkna2bknks6f7z2255y

A Knowledge-based Security Policy Framework for Business Process Management

Dong Huang, Yi Yang, Jacques Calmet
2006 2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce (CIMCA'06)  
Business Process Management (BPM) is often a key component of the business change.  ...  Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasing role of prominence in process-centric business and system strategies.  ...  Introduction Business Process Management (BPM) is often a key component of the business change.  ... 
doi:10.1109/cimca.2006.12 dblp:conf/cimca/HuangYC06 fatcat:fjsjvz5cuvcznbahbqtlk33qeu

Enabling Community Health Care with Microservices [article]

Richard Hill, Dharmendra Shadija, Mo Rezai
2017 arXiv   pre-print
This is another compelling reason for the uptake of IoT technologies, whereby continuous monitoring of a care recipient can be employed. This has two key benefits.  ...  When the care recipient's heart rate is below 40 bpm and their blood pressure is below 90, an alarm condition is detected for the home monitor to take further action.  ... 
arXiv:1709.07037v2 fatcat:wrmlxkxen5hoxamqdvuhlw3xoi

Enabling Community Health Care with Microservices

Richard Hill, Dharmendra Shadija, Mo Rezai
2017 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)  
This is another compelling reason for the uptake of IoT technologies, whereby continuous monitoring of a care recipient can be employed. This has two key benefits.  ...  When the care recipient's heart rate is below 40 bpm and their blood pressure is below 90, an alarm condition is detected for the home monitor to take further action.  ... 
doi:10.1109/ispa/iucc.2017.00220 dblp:conf/ispa/HillSR17 fatcat:dlkmq7obfrcbjnjycry5prb74u

Performance analysis model for service supply chains : case of the retirement supply chain

Houda Mezouar, Abdellatif El Afia
2018 International Journal of Engineering & Technology  
It uses a methodology that combine Analysis-Specification-Design-Implementation (ASDI), Office Support Systems Analy-sis and Design (OSSAD), Business Process Management (BPM), and Supply Chain Operations  ...  Then BPM is used for the specification by modeling the studied process with BPMN via BONITA BPM and simulating its behavior with the same tool.  ...  Their research suggests that both employed and self-employed individuals who are financially optimistic could face the very negative consequences of pension shortfall and low pensions income when they  ... 
doi:10.14419/ijet.v7i3.13929 fatcat:vikgqyfqovbp3jreml7726bts4

Distributed reinforcement learning for adaptive and robust network intrusion response

Kleanthis Malialis, Sam Devlin, Daniel Kudenko
2015 Connection science  
The BPM algorithm is shown in Algorithm 1. BPM has the following limitations; it infers router overhead and has a high demand for perpacket space requirement.  ...  The Basic Packet Marking (BPM) appends each router's address to each packet as it traverses from the attacker to the victim.  ... 
doi:10.1080/09540091.2015.1031082 fatcat:vzwfb5cclzdqdhwgxzqozxe3xi

Careflow: Theory and Practice [chapter]

John Fox, Robert Dunlop
2008 Lecture Notes in Computer Science  
This research was supported in part by Australian Research Council Linkage-Projects grant LP0776344. 5th International Conference on BPM 2007 Workshop: BPM in Healthcare  ...  Workshop: BPM in Healthcare  ...  Currently employed HIS concentrate often on patient-related data rather than consider treatments as processes producing these data.  ... 
doi:10.1007/978-3-540-78238-4_32 fatcat:h7cfytvcsvgfznyyc7caea555e

Business Intelligence using Software Agents

Ana-Ramona BOLOGA, Razvan BOLOGA
2011 Database Systems Journal  
Intelligent delivery -proactive information delivery of selected information using appropriate channels.  ...  Agent-based applications and a BPM (Business Process Management) platform could be involved in encoding horizontal analytic knowledge and domain specific knowledge. iv.  ... 
doaj:798ba82a37a24c01870ffef8ac3d3dac fatcat:nwghzvjrx5c3rpiop4ujlrptyu

Real-Time Multi-Agent Systems for Telerehabilitation Scenarios

Davide Calvaresi, Mauro Marinoni, Aldo Franco Dragoni, Roger Hilfiker, Michael Schumacher
2019 Artificial Intelligence in Medicine  
In particular, to be employed in safety-critical cyber-physical scenarios with user-sensor and sensor-sensor interactions, MAS are requested to handle timing constraints, scarcity of resources and new  ...  Moreover, by employing thirdparty sensors, they were able to obtain oxygen level, posture, gesture, stress, BPM, and mood. Combining such values, pain or fatigue could also be detected.  ...  The system is composed of three agents, possibly being proactive and/or reactive.  ... 
doi:10.1016/j.artmed.2019.02.001 pmid:30827696 fatcat:i75e4wbkmzb5hdhld73nhjknj4

Rule Responder Agents Framework and Instantiations [chapter]

Harold Boley, Adrian Paschke
2011 Studies in Computational Intelligence  
Rule Responder is a framework for specifying virtual organizations as semantic multiagent systems that support collaborative teams.  ...  To implement different distributed system/agent toplogies with their negotiation/coordination mechanisms Rule Responder instantiations employ three core classes of agents -Organizational Agents (OA), Personal  ...  An agent can employ vocabularies defined as Semantic Web ontologies (e.g., based on RDFS or OWL) to give its rules a domain-specific meaning.  ... 
doi:10.1007/978-3-642-18308-9_1 fatcat:da75woatbzhyperju5gab3nmfu

Pro-Active Service Ecosystem Framework

Tiago Cardoso, Luis M. Camarinha-Matos
2013 International journal of computer integrated manufacturing (Print)  
On one hand, KIMM's framework is close to PASEF in what concerns the multiagent systems characteristics.  ...  Camarinha-Matos SCI WoS P 4 Proactivity in collaborative Services Ecosystems Conference: PRO-VE'11 Oct. 2011 (Cardoso and Camarinha- Matos, 2011a) WoS P 3 ProActive Service Entity  ... 
doi:10.1080/0951192x.2012.684713 fatcat:4lu3l24p3zekzilu2poqvjltwm

Agent Technology Overview [chapter]

Developing Multi-Agent Systems with JADE  
As such, they can act in reactive and proactive ways.  ...  Permission-related polices can be enforced proactively. Obligations, by their nature, cannot be proactively enforced though they can be monitored.  ... 
doi:10.1002/9780470058411.ch2 fatcat:upw7rnmdt5cdbgdzrwjszhandu

VM-Flow [chapter]

Ivo J. G. dos Santos, Edmundo R. M. Madeira
2004 IFIP International Federation for Information Processing  
The capacity of Multiagent Systems to distribute the work among several autonomous, rational and proactive entities (the intelligent agents) and even to adapt and re-organize themselves in some extent,  ...  Since explicit modal satisfaction checks would be inefficient, symbolic techniques are employed.  ... 
doi:10.1007/1-4020-8155-3_15 fatcat:tdnlcms72rbznjvwphoztdx37y
« Previous Showing results 1 — 15 out of 39 results