18,247 research outputs found

    HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree

    Get PDF
    Small-world phenomena have been observed in existing peer-to-peer (P2P) networks which has proved useful in the design of P2P file-sharing systems. Most studies of constructing small world behaviours on P2P are based on the concept of clustering peer nodes into groups, communities, or clusters. However, managing additional multilayer topology increases maintenance overhead, especially in highly dynamic environments. In this paper, we present Social-like P2P systems (Social-P2Ps) for object discovery by self-managing P2P topology with human tactics in social networks. In Social-P2Ps, queries are routed intelligently even with limited cached knowledge and node connections. Unlike community-based P2P file-sharing systems, we do not intend to create and maintain peer groups or communities consciously. In contrast, each node connects to other peer nodes with the same interests spontaneously by the result of daily searches

    SOLACE: A framework for electronic negotiations

    Get PDF
    Copyright @ 2011 Walter de Gruyter GmbHMost existing frameworks for electronic negotiations today are tied to specific negotiation systems for which they were developed, preventing them from being applied to other negotiation scenarios. Thus, the evaluation of electronic negotiation systems is difficult as each one is based on a different framework. Additionally, each developer has to design a new framework for any system to be developed, leading to a ‘reinvention of the wheel’. This paper presents SOLACE—a generic framework for multi-issue negotiations, which can be applied to a variety of negotiation scenarios. In contrast with other frameworks for electronic negotiations, SOLACE supports hybrid systems in which the negotiation participants can be humans, agents or a combination of the two. By recognizing the importance of strategies in negotiations and incorporating a time attribute in negotiation proposals, SOLACE enhances existing approaches and provides a foundation for the flexible electronic negotiation systems of the future

    Autonomous Agents for Business Process Management

    No full text
    Traditional approaches to managing business processes are often inadequate for large-scale organisation-wide, dynamic settings. However, since Internet and Intranet technologies have become widespread, an increasing number of business processes exhibit these properties. Therefore, a new approach is needed. To this end, we describe the motivation, conceptualization, design, and implementation of a novel agent-based business process management system. The key advance of our system is that responsibility for enacting various components of the business process is delegated to a number of autonomous problem solving agents. To enact their role, these agents typically interact and negotiate with other agents in order to coordinate their actions and to buy in the services they require. This approach leads to a system that is significantly more agile and robust than its traditional counterparts. To help demonstrate these benefits, a companion paper describes the application of our system to a real-world problem faced by British Telecom

    A multi-agent system with application in project scheduling

    Get PDF
    The new economic and social dynamics increase project complexity and makes scheduling problems more difficult, therefore scheduling requires more versatile solutions as Multi Agent Systems (MAS). In this paper the authors analyze the implementation of a Multi-Agent System (MAS) considering two scheduling problems: TCPSP (Time-Constrained Project Scheduling), and RCPSP (Resource-Constrained Project Scheduling). The authors propose an improved BDI (Beliefs, Desires, and Intentions) model and present the first the MAS implementation results in JADE platform.multi-agent architecture, scheduling, project management, BDI architecture, JADE.

    Optimizing Strategy in Agent-Based Automated Negotiation

    Get PDF

    DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments

    Get PDF
    With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure its secure adoption are an immediate need. Here, we focus on intrusion detection and prevention systems (IDPSs) to defend against the intruders. In this paper, we propose a Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention system (DCDIDP). Its goal is to make use of the resources in the cloud and provide a holistic IDPS for all cloud service providers which collaborate with other peers in a distributed manner at different architectural levels to respond to attacks. We present the DCDIDP framework, whose infrastructure level is composed of three logical layers: network, host, and global as well as platform and software levels. Then, we review its components and discuss some existing approaches to be used for the modules in our proposed framework. Furthermore, we discuss developing a comprehensive trust management framework to support the establishment and evolution of trust among different cloud service providers. © 2011 ICST

    Agent based mobile negotiation for personalized pricing of last minute theatre tickets

    Get PDF
    This is the post-print version of the final paper published in Expert Systems with Applications. The published article is available from the link below. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. Copyright @ 2012 Elsevier B.V.This paper proposes an agent based mobile negotiation framework for personalized pricing of last minutes theatre tickets whose values are dependent on the time remaining to the performance and the locations of potential customers. In particular, case based reasoning and fuzzy cognitive map techniques are adopted in the negotiation framework to identify the best initial offer zone and adopt multi criteria decision in the scoring function to evaluate offers. The proposed framework is tested via a computer simulation in which personalized pricing policy shows higher market performance than other policies therefore the validity of the proposed negotiation framework.The Ministry of Education, Science and Technology (Korea

    MORPH: A Reference Architecture for Configuration and Behaviour Self-Adaptation

    Full text link
    An architectural approach to self-adaptive systems involves runtime change of system configuration (i.e., the system's components, their bindings and operational parameters) and behaviour update (i.e., component orchestration). Thus, dynamic reconfiguration and discrete event control theory are at the heart of architectural adaptation. Although controlling configuration and behaviour at runtime has been discussed and applied to architectural adaptation, architectures for self-adaptive systems often compound these two aspects reducing the potential for adaptability. In this paper we propose a reference architecture that allows for coordinated yet transparent and independent adaptation of system configuration and behaviour

    Automated Federation Of Virtual Organization In Grid Using Select, Match, Negotiate And Expand (SMNE) Protocol [QA76.9.C58 C518 2008 f rb].

    Get PDF
    Sekelompok sumber perkomputeran yang teragih dan berlainan jenis dalam persekitaran grid akan membentuk organisasi maya dan berkongsi sumber komputer. A group of distributed and heterogeneous resources in a grid environment may form a Virtual Organization (VO) to enable resource sharing
    corecore