752 research outputs found

    Distributed Information Management with Mobile Agents

    No full text
    With more users taking advantage of publicly accessible networks, such as corporate intranets and the Internet, larger amounts of information is becoming electronically distributed and disseminated. Distributed information management is an emerging technology for dealing with the problems of managing information that is spread across networks, users and applications. We present four categories that we consider being necessary to developing tools to undertake distributed information management tasks. To help model the dynamic and heterogeneous nature of a user's distributed information, we advocate the use of agents and agent technologies when building distributed information management applications. We present an agent-oriented architecture which is based around a concept of mobile agents, since they provide a convenient abstraction for modelling distributed applications

    A survey of agent-oriented methodologies

    Get PDF
    This article introduces the current agent-oriented methodologies. It discusses what approaches have been followed (mainly extending existing object oriented and knowledge engineering methodologies), the suitability of these approaches for agent modelling, and some conclusions drawn from the survey

    Agent-Based Computing: Promise and Perils

    No full text
    Agent-based computing represents an exciting new synthesis both for Artificial Intelligence (AI) and, more generally, Computer Science. It has the potential to significantly improve the theory and practice of modelling, designing and implementing complex systems. Yet, to date, there has been little systematic analysis of what makes an agent such an appealing and powerful conceptual model. Moreover, even less effort has been devoted to exploring the inherent disadvantages that stem from adopting an agent-oriented view. Here both sets of issues are explored. The standpoint of this analysis is the role of agent-based software in solving complex, real-world problems. In particular, it will be argued that the development of robust and scalable software systems requires autonomous agents that can complete their objectives while situated in a dynamic and uncertain environment, that can engage in rich, high-level social interactions, and that can operate within flexible organisational structures

    UCTx: a multi-agent system to assist a transplant coordination unit

    Get PDF
    We present a system called UCTx, designed to model and automate some of the tasks performed by a Transplant Coordination Unit (UCTx) inside a Hospital. The aim of this work is to show how a multi-agent approach allows us to describe and implement the model, and how UCTx is capable of dealing with another multi-agent (Carrel, an Agent Mediated Institution for the exchange of Human Tissues among Hospitals for Transplantation) in order to meet its own goals, acting as the representative of the hospital in the negotiation. As an example we introduce the use of this Agency in the case of Cornea Transplantation.Postprint (published version

    MAGDA: A Mobile Agent based Grid Architecture

    Get PDF
    Mobile agents mean both a technology and a programming paradigm. They allow for a flexible approach which can alleviate a number of issues present in distributed and Grid-based systems, by means of features such as migration, cloning, messaging and other provided mechanisms. In this paper we describe an architecture (MAGDA – Mobile Agent based Grid Architecture) we have designed and we are currently developing to support programming and execution of mobile agent based application upon Grid systems

    Secure Cloud Storage: A Framework for Data Protection as a Service in the Multi-cloud Environment

    Get PDF
    This paper introduces Secure Cloud Storage (SCS), a framework for Data Protection as a Service (DPaaS) to cloud computing users. Compared to the existing Data Encryption as a Service (DEaaS) such as those provided by Amazon and Google, DPaaS provides more flexibility to protect data in the cloud. In addition to supporting the basic data encryption capability as DEaaS does, DPaaS allows users to define fine-grained access control policies to protect their data. Once data is put under an access control policy, it is automatically encrypted and only if the policy is satisfied, the data could be decrypted and accessed by either the data owner or anyone else specified in the policy. The key idea of the SCS framework is to separate data management from security management in addition to defining a full cycle of data security automation from encryption to decryption. As a proof-of-concept for the design, we implemented a prototype of the SCS framework that works with both BT Cloud Compute platform and Amazon EC2. Experiments on the prototype have proved the efficiency of the SCS framework

    Decentralized Multi-Subgroup Formation Control With Connectivity Preservation and Collision Avoidance

    Get PDF
    This paper proposes a formation control algorithm to create separated multiple formations for an undirected networked multi-agent system while preserving the network connectivity and avoiding collision among agents. Through the modified multi-consensus technique, the proposed algorithm can simultaneously divide a group of multiple agents into any arbitrary number of desired formations in a decentralized manner. Furthermore, the agents assigned to each formation group can be easily reallocated to other formation groups without network topological constraints as long as the entire network is initially connected; an operator can freely partition agents even if there is no spanning tree within each subgroup. Besides, the system can avoid collision without loosing the connectivity even during the transient period of formation by applying the existing potential function based on the network connectivity estimation. If the estimation is correct, the potential function not only guarantees the connectivity maintenance but also allows some extra edges to be broken if the network remains connected. Numerical simulations are performed to verify the feasibility and performance of the proposed multi-subgroup formation control
    corecore