2,468 research outputs found

    An agent-based approach to assess drivers’ interaction with pre-trip information systems.

    Get PDF
    This article reports on the practical use of a multi-agent microsimulation framework to address the issue of assessing drivers’ responses to pretrip information systems. The population of drivers is represented as a community of autonomous agents, and travel demand results from the decision-making deliberation performed by each individual of the population as regards route and departure time. A simple simulation scenario was devised, where pretrip information was made available to users on an individual basis so that its effects at the aggregate level could be observed. The simulation results show that the overall performance of the system is very likely affected by exogenous information, and these results are ascribed to demand formation and network topology. The expressiveness offered by cognitive approaches based on predicate logics, such as the one used in this research, appears to be a promising approximation to fostering more complex behavior modelling, allowing us to represent many of the mental aspects involved in the deliberation process

    Design of a Mobile Agent for Monitoring Activities of Users

    Get PDF
    Monitoring is an aspect of network management aimed at ensuring optimal performance of the network and that the users play by the rules. This paper presents the design of a mobile agent for monitoring the activities of users in a network. Users’ activities can be localized on their personal workstation or extended to the enterprise network and the Internet, in which case it can impact on the subscribed bandwidth, which is a shared resource of the corporate entity that they represent. All users hope to work in an environment of unlimited resources, including disk space, RAM and bandwidth. However, though the cost of these computing resources have reduced significantly owning to advances in microelectronic technology, they are still far from being free and inexhaustible. In this research, we design a mobile agent tool that can monitor users’ activities in a network environment with a view to enhancing the effective utilisation of system resources, and in particular, the physical memory. The aim is to enable optimal resource utilisation in the network environment. In this paper, we define a mathematical formulation of user activities, load overhead of mobile agents and itinerary partition to avoid the over-bloating problem. The architecture of the mobile agent is explained. Keywords: Mobile Agent; System resources; Computer network; Code Mobility; Monitorin

    Design of a Mobile Agent for Monitoring Activities of Users

    Get PDF
    Monitoring is an aspect of network management aimed at ensuring optimal performance of the network and that the users play by the rules. This paper presents the design of a mobile agent for monitoring the activities of users in a network. Users’ activities can be localized on their personal workstation or extended to the enterprise network and the Internet, in which case it can impact on the subscribed bandwidth, which is a shared resource of the corporate entity that they represent. All users hope to work in an environment of unlimited resources, including disk space, RAM and bandwidth. However, though the cost of these computing resources have reduced significantly owning to advances in microelectronic technology, they are still far from being free and inexhaustible. In this research, we design a mobile agent tool that can monitor users’ activities in a network environment with a view to enhancing the effective utilisation of system resources, and in particular, the physical memory. The aim is to enable optimal resource utilisation in the network environment. In this paper, we define a mathematical formulation of user activities, load overhead of mobile agents and itinerary partition to avoid the over-bloating problem. The architecture of the mobile agent is explained. Keywords: Mobile Agent, System resources, Computer network, Code Mobility, Monitorin

    Behavioral pattern analysis of secure migration and communications in eCommerce using cryptographic protocols on a mobile MAS platform

    Get PDF
    Mobile Multi-Agent Systems (MAS) systems can be used with real success in a growing number of eCommerce applications nowadays. Security has been identified as numerous times by different researchers as a top criterion for the acceptance of mobile agent adoption. In this paper we present an in-depth analysis of behavior patterns of a mobile MAS platform when using different cryptographic protocols to assure communication and migration integrity and confidentiality. Different use case sceneries of eCommerce applications as well as many other aspects have been studied, such as overhead, different communication patterns, different loads and bandwidth issues. This work is also extensible to other mobile and non-mobile MAS platforms. The results obtained can be used and should be taken into account by designers and implementers of secure mobile and also non-mobile agent platforms and agents.European Union TeleCARE IST-2000-2760

    Mobile-Agent Planning in a Market-Oriented Environment

    Get PDF
    We propose a method for increasing incentives for sites to host arbitrary mobile agents in which mobile agents purchase their computing needs from host sites. We present a scalable market-based CPU allocation policy and an on-line algorithm that plans a mobile agent\u27s expenditure over a multihop ordered itinerary. The algorithm chooses a set of sites at which to execute and computational priorities at each site to minimize execution time while preserving a prespecified budget constraint. We present simulation results of our algorithm to show that our allocation policy and planning algorithm scale well as more agents are added to the system

    Computational Markets to Regulate Mobile-Agent Systems

    Get PDF
    Mobile-agent systems allow applications to distribute their resource consumption across the network. By prioritizing applications and publishing the cost of actions, it is possible for applications to achieve faster performance than in an environment where resources are evenly shared. We enforce the costs of actions through markets where user applications bid for computation from host machines. \par We represent applications as collections of mobile agents and introduce a distributed mechanism for allocating general computational priority to mobile agents. We derive a bidding strategy for an agent that plans expenditures given a budget and a series of tasks to complete. We also show that a unique Nash equilibrium exists between the agents under our allocation policy. We present simulation results to show that the use of our resource-allocation mechanism and expenditure-planning algorithm results in shorter mean job completion times compared to traditional mobile-agent resource allocation. We also observe that our resource-allocation policy adapts favorably to allocate overloaded resources to higher priority agents, and that agents are able to effectively plan expenditures even when faced with network delay and job-size estimation error
    • …
    corecore