5,535 Hits in 3.3 sec

Message from the WI'04 and IAT'04 Conference Chairs and Program Chair

2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI'04)  
computing; problem-solving in dynamic environments; distributed search • Autonomous Auctions and Negotiation: agent-based marketplaces; auction markets; combinatorial auctions; hybrid negotiation; integrative  ...  and Methodology: agent interaction protocols; fault-tolerance in multiagent systems; formal framework for multi-agent systems; information exchanges in multi-agent systems; learning and self-adaptation  ... 
doi:10.1109/wi.2004.10001 fatcat:hqdw2dxf55gsdkxsxfru7insl4

Welcome Message from Conference Chairs and Program Chair

2005 The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05)  
Agent Technology and (WI'05 and IAT'05).  ...  The IEEE/WIC/ACM 2005 joint conferences are sponsored and organized by IEEE Computer Society Technical Committee on Intelligent Informatics (TCII), Web Intelligence Consortium (WIC), and ACM-SIGART.  ...  their support in making this volume possible.  ... 
doi:10.1109/wi.2005.163 dblp:conf/webi/X05 fatcat:hfbpqwatovbphhqzxxuvhezpxe

A multi‐agent approach for provisioning of e‐services in u‐commerce environments

Nayat Sanchez‐Pi, Jose Manuel Molina, L. Martínez‐López
2010 Internet Research  
Originality/value -The research proposes an MAS designed for u-commerce domains, analyzes the capacity of trust management techniques in this environment, and proposes several evaluation methods to show  ...  of e-services in u-commerce environments.  ...  We can find several approaches developing platforms, frameworks and applications for offering context-aware services in ubiquitous computing where intelligent agents technology has been applied in order  ... 
doi:10.1108/10662241011050713 fatcat:3stqtvdy3nag7k4yjodwxy4y6e

UbiRoad: Semantic Middleware for Context-Aware Smart Road Environments

Vagan Terziyan, Olena Kaykova, Dmytro Zhovtobryukh
2010 2010 Fifth International Conference on Internet and Web Applications and Services  
For that, an Intelligent Transportation System, which is operating on top of numerous sensor and access networks and governing the process of mobile services provisioning to the users in self-managed and  ...  during their presence in the environment.  ...  among the components of ubiquitous computing systems.  ... 
doi:10.1109/iciw.2010.50 fatcat:ibniivk2bjglxnrir4i4vf232u

Adaptive Security Schemes based on Context and Trust for Ubiquitous Computing Environment: A Comprehensive Survey

G. Jagadamba, B. Sathish Babu
2017 Indian Journal of Science and Technology  
Application/ Improvements: The proposed framework can be used to applications built in the Ubiquitous Computing Environment (UCE) such as Ubiquitous-healthcare, U-learning, U-smart campus, and so on.  ...  Objectives: To present the principle of working of some of the widely used adaptive security schemes in the domain of ubiquitous computing.  ...  Hence, a computational intelligence for trust pointed the influence and transfer of trust as interdisciplinary research work 45 .  ... 
doi:10.17485/ijst/2016/v9i48/89396 fatcat:xf5kghfkqnh3dg5lfdgzmxrqsq

Multi-agent System (MAS) Applications in Ambient Intelligence (AmI) Environments [chapter]

Nayat Sánchez-Pi, Eleni Mangina, Javier Carbó, José Manuel Molina
2010 Advances in Intelligent and Soft Computing  
Research in context-aware systems has been moving towards reusable and adaptable architectures for managing more advanced human-computer interfaces. Ambient.  ...  In this paper we present an agent-based architecture which supports the execution of agents in AmI environments.  ...  User agents main goals includes negotiation with the facilitator agent, recommend services to other user agents, trust in other agents, and manage and improve their internal profile to receive better services  ... 
doi:10.1007/978-3-642-12433-4_58 dblp:conf/paams/PiMCM10 fatcat:4ibc7obn6fhvzeen35wakd5jku

Secure Client Agent Environment (SCAE) for World Wide Web [chapter]

Richard Au, Ming Yao, Mark Looi, Paul Ashley
2002 Lecture Notes in Computer Science  
In our agent-based framework, domain-based security servers and authorisation tokens are used to complete the trust links between the client and various Web servers dynamically.  ...  We propose a novel agent workspace on the client side for hosting Web agents downloaded from different Web servers -the "Secure Client Agent Environment" (SCAE).  ...  However, we argue that the ubiquitous availability of a trusted and secure environment for agent execution is essential for successful usage of the agent paradigm.  ... 
doi:10.1007/3-540-45705-4_25 fatcat:gbhd43c7vndszdqo4p5k4cphqy

Proactive Future Internet: Smart Semantic Middleware for Overlay Architecture

Vagan Terziyan, Dmytro Zhovtobryukh, Artem Katasonov
2009 2009 Fifth International Conference on Networking and Services  
To tackle these problems, PROFI intends utilization of semantic languages (RDF-based) for declarative specification of network elements' behavior, and application of software agents as engines for executing  ...  flexible cooperation among network elements, including coordination, conflict resolution and even negotiation.  ...  An important attribute of the management framework is its support for decentralized control.  ... 
doi:10.1109/icns.2009.8 dblp:conf/icns/TerziyanZK09 fatcat:nern4xsb5ncmbjprhzbivhtl2e

Research Directions for Service-Oriented Multiagent Systems

M.N. Huhns, M.P. Singh, M. Burstein, K. Decker, E. Durfee, T. Finin, L. Gasser, H. Goradia, N. Jennings, K. Lakkaraju, H. Nakashima, V. Parunak (+8 others)
2005 IEEE Internet Computing  
for service-oriented multiagent system research.  ...  Because these two fields are so deeply connected, further advances in multiagent systems could feed into tomorrow's successful service-oriented computing approaches.This article describes a 15year roadmap  ...  Science Foundation, under grant number IIS-0531746, and the Defense Advanced Research Projects Agency, under grant number HR0011-05-1-0020, supported the retreat at which we formulated the ideas described in  ... 
doi:10.1109/mic.2005.132 fatcat:c7dn3m4korhfhgoeqse536hdje

Software agents for knowledge management: coordination in multi-agent supply chains and auctions

D.J Wu
2001 Expert systems with applications  
The coordination problem is ubiquitous in knowledge management, such as in manufacturing, supply chains, negotiation, and agent-mediated auctions.  ...  Will DNA computing be a viable tool for the analysis of agent-based supply chains? ² Coordination mechanisms in agent-mediated auctions.  ...  Partial support of this work was by a research fellowship from Safeguard Scienti®cs Center for Electronic Commerce Management, and a mini-Summer research grant from LeBow College of Business, Drexel University  ... 
doi:10.1016/s0957-4174(00)00048-8 fatcat:qza3ds26wzhkdnx4mbvz7444yu

Norms for Modeling Agents' Interaction in Ubiquitous Environments

Ismail Khalil Ibrahim
2008 Mobile Information Systems  
literature for the use of agents in ubiquitous environments for a wide range of applications such as user interfaces, mobile computing, information retrieval and filtering, smart messaging, telecommunication  ...  In this paper, we address the problem of modeling agents' interaction in ubiquitous environments.  ...  Modeling agent interaction using norms Agent based computing opens up new opportunities for creating distributed, intelligent, integrated and cooperative mobile services that make use of contextual information  ... 
doi:10.1155/2008/960375 fatcat:57ke2gscb5h25ctffvwkhnis7u

Interaction through negotiation

Christina Brodersen, Jannie Friis Kristensen
2004 Proceedings of the third Nordic conference on Human-computer interaction - NordiCHI '04  
In this paper we discuss recent developments in interaction design principles for ubiquitous computing environments, specifically implications related to situated and mobile aspects of work.  ...  We present 'Interaction through Negotiation' as a general Human-Computer Interaction (HCI) paradigm, aimed at ubiquitous/pervasive technology and environments, with focus on facilitating negotiation in  ...  ACKNOWLEDGMENTS We wish to thank our colleagues in the CIS project, the Workspace project, the EPR project and the C&E project for inspiring collaboration and discussions.  ... 
doi:10.1145/1028014.1028054 dblp:conf/nordichi/BrodersenK04 fatcat:sbtucd5qr5awxksyc3ccwlukle

Introduction to Agent Mining Interaction and Integration [chapter]

Longbing Cao
2009 Data Mining and Multi-agent Integration  
many aspects, from theoretical, methodological, and experimental to practical issues in developing agent-based computing and agent-oriented intelligent systems, which are a powerful technology for autonomous  ...  The agent technology contributes to many diverse domains such as software engineering, user interfaces, ecommerce, information retrieval, robotics, computer games, education and training, ubiquitous computing  ...  Acknowledgements This work is sponsored in part by Australian Research Council Grants (DP0988016, LP0989721, DP0773412, and LP0775041).  ... 
doi:10.1007/978-1-4419-0522-2_1 fatcat:4d4cx7wmvzgejnegoujwhrhs4u

A Privacy Agent in Context-Aware Ubiquitous Computing Environments [chapter]

Ni Zhang, Chris Todd
2006 Lecture Notes in Computer Science  
This paper targets personal privacy protection in context-aware ubiquitous computing environments.  ...  In essence, the development of the privacy agent technology employs privacy terminology and policies specified in Platform for Privacy Preferences Project (P3P) [1], and uses ontological modeling technique  ...  Section 5 continues with some implementation consideration of the privacy agent. In section 6, we look at relevant research efforts towards privacy protection in ubiquitous computing environments.  ... 
doi:10.1007/11909033_18 fatcat:pikim2iopfbgzh67qqlurj737q

Security middleware approaches and issues for ubiquitous applications

Jameela Al-Jaroodi, Imad Jawhar, Alyaziyah Al-Dhaheri, Fatmah Al-Abdouli, Nader Mohamed
2010 Computers and Mathematics with Applications  
Recently, ubiquitous computing and pervasive environments evolved tremendously and became an integral part of many fields and application domains.  ...  Middleware is an essential layer in the architecture of these new systems, and recently, more emphasis has been put on security middleware as an enabling component for ubiquitous applications.  ...  We would also like to thank the anonymous reviewers for their valuable comments and suggestions that helped us produce a more concise article.  ... 
doi:10.1016/j.camwa.2010.01.009 fatcat:ds73w7jfo5ejvpdpwlgtmq2lba
« Previous Showing results 1 — 15 out of 5,535 results