6,870 research outputs found
Решение некоторых проблем защиты мультиагентных систем
In article the analysis of categories of the distributed systems and characteristic threats for them is carried out. The basic attention is given development of methods of protection in multiagent systems.
Realization of platform methods of protection in multiagent systems is considered.Проводится анализ категорий распределенных систем и характерных для них угроз.
Основное внимание уделяется разработке методов защиты мультиагентных систем. Рассмотрена реализация платформенных методов защиты мультиагентных систем
Complex Protection System of Metadata-based Distributed Information Systems
A description of architecture and approaches to the implementation of a protection system of metadatabased
adaptable information systems is suggested. Various protection means are examined. The system
described is a multilevel complex based on a multiagent system combining IDS functional abilities with structure
and logics protection means
A system-theoretic framework for privacy preservation in continuous-time multiagent dynamics
In multiagent dynamical systems, privacy protection corresponds to avoid
disclosing the initial states of the agents while accomplishing a distributed
task. The system-theoretic framework described in this paper for this scope,
denoted dynamical privacy, relies on introducing output maps which act as
masks, rendering the internal states of an agent indiscernible by the other
agents as well as by external agents monitoring all communications. Our output
masks are local (i.e., decided independently by each agent), time-varying
functions asymptotically converging to the true states. The resulting masked
system is also time-varying, and has the original unmasked system as its limit
system. When the unmasked system has a globally exponentially stable
equilibrium point, it is shown in the paper that the masked system has the same
point as a global attractor. It is also shown that existence of equilibrium
points in the masked system is not compatible with dynamical privacy.
Application of dynamical privacy to popular examples of multiagent dynamics,
such as models of social opinions, average consensus and synchronization, is
investigated in detail.Comment: 38 pages, 4 figures, extended version of arXiv preprint
arXiv:1808.0808
Embedded intelligence for electrical network operation and control
Integrating multiple types of intelligent, mulitagent data analysis within a smart grid can pave the way for flexible, extensible, and robust solutions to power network management
Allocating Limited Resources to Protect a Massive Number of Targets using a Game Theoretic Model
Resource allocation is the process of optimizing the rare resources. In the
area of security, how to allocate limited resources to protect a massive number
of targets is especially challenging. This paper addresses this resource
allocation issue by constructing a game theoretic model. A defender and an
attacker are players and the interaction is formulated as a trade-off between
protecting targets and consuming resources. The action cost which is a
necessary role of consuming resource, is considered in the proposed model.
Additionally, a bounded rational behavior model (Quantal Response, QR), which
simulates a human attacker of the adversarial nature, is introduced to improve
the proposed model. To validate the proposed model, we compare the different
utility functions and resource allocation strategies. The comparison results
suggest that the proposed resource allocation strategy performs better than
others in the perspective of utility and resource effectiveness.Comment: 14 pages, 12 figures, 41 reference
Anyone but Him: The Complexity of Precluding an Alternative
Preference aggregation in a multiagent setting is a central issue in both
human and computer contexts. In this paper, we study in terms of complexity the
vulnerability of preference aggregation to destructive control. That is, we
study the ability of an election's chair to, through such mechanisms as
voter/candidate addition/suppression/partition, ensure that a particular
candidate (equivalently, alternative) does not win. And we study the extent to
which election systems can make it impossible, or computationally costly
(NP-complete), for the chair to execute such control. Among the systems we
study--plurality, Condorcet, and approval voting--we find cases where systems
immune or computationally resistant to a chair choosing the winner nonetheless
are vulnerable to the chair blocking a victory. Beyond that, we see that among
our studied systems no one system offers the best protection against
destructive control. Rather, the choice of a preference aggregation system will
depend closely on which types of control one wishes to be protected against. We
also find concrete cases where the complexity of or susceptibility to control
varies dramatically based on the choice among natural tie-handling rules.Comment: Preliminary version appeared in AAAI '05. Also appears as
URCS-TR-2005-87
Multi-agent systems for power engineering applications - part 1 : Concepts, approaches and technical challenges
This is the first part of a 2-part paper that has arisen from the work of the IEEE Power Engineering Society's Multi-Agent Systems (MAS) Working Group. Part 1 of the paper examines the potential value of MAS technology to the power industry. In terms of contribution, it describes fundamental concepts and approaches within the field of multi-agent systems that are appropriate to power engineering applications. As well as presenting a comprehensive review of the meaningful power engineering applications for which MAS are being investigated, it also defines the technical issues which must be addressed in order to accelerate and facilitate the uptake of the technology within the power and energy sector. Part 2 of the paper explores the decisions inherent in engineering multi-agent systems for applications in the power and energy sector and offers guidance and recommendations on how MAS can be designed and implemented
Practical applications of multi-agent systems in electric power systems
The transformation of energy networks from passive to active systems requires the embedding of intelligence within the network. One suitable approach to integrating distributed intelligent systems is multi-agent systems technology, where components of functionality run as autonomous agents capable of interaction through messaging. This provides loose coupling between components that can benefit the complex systems envisioned for the smart grid. This paper reviews the key milestones of demonstrated agent systems in the power industry and considers which aspects of agent design must still be addressed for widespread application of agent technology to occur
- …