9 research outputs found

    Svjesnost konteksta u mreži pokretnih programskih agenata

    Get PDF
    The paper deals with context awareness in information, communication and computing systems and context introduction in mobile software agent network. Mobile agent network is a formal system that includes a multi-agent system residing in a network of interconnected nodes, which hosts agents, allowing their operation, communication and migration. Software agents can help in managing complex relationships between information and communication service users and service providers. The role of intelligent and mobile agents representing service users and service providers in the network and supporting context awareness is considered. Context is defined as any information that can be used to characterize the situation of an entity respecting its physical, social, communication and computing environment. A unified treatment of context information contained in the user profile, presence service and those relevant for general context-aware systems is proposed in order to preserve the functionality and performance evaluation capabilities of the mobile agent network. The approach elaborated in the paper is based on conceptual context representation, system services and agent operations required for supporting context-awareness in the mobile agent network. Case study on agent-based ad-hoc social network service is included.Rad se bavi svjesnošću konteksta u informacijskim, komunikacijskim i računalnim sustavima i uvođenjem konteksta u mrežu pokretnih programskih agenata. Mreža pokretnih agenata je formalni sustav koji uključuje višeagentski sustav koji djeluje u mreži međusobno povezanih čvorova koji udomljuju agente, omogućujući im provedbu operacija, komunikaciju i migraciju. Programski agenti mogu pridonijeti upravljanju složenih odnosa između korisnika i davatelja informacijskih i komunikacijskih usluga. Razmatra se uloga inteligentnih i pokretnih agenata koji predstavljaju korisnike i davatelje usluga u mreži te im omogućuju kontekstno svjesnu potporu. Kontekst se definira kao svaka informacija kojom se može obilježiti situacija nekog entiteta uvažavajući njegovo fizičko, društveno, komunikacijsko i računalno okružje. Predlaže se objedinjeno tretiranje kontekstne informacije sadržane u korisničkom profilu, usluzi nazočnosti, kao i one mjerodavne za opće kontekstnosvjesne sustave, kako bi se očuvala mogućnost evaluacije funkcionalnosti i performansi mreže pokretnih agenata. Pristup obrađen u radu zasniva se na koncepcijskom predočavanju konteksta te uslugama sustava i agentskim operacijama potrebnima za potporu konteksta u mreži pokretnih agenata. Uključen je studijski primjer agentski zasnovanog ad-hoc društvenog umrežavanja

    Implicit Social Networking: Discovery of Hidden Relationships, Roles and Communities among Consumers

    Get PDF
    AbstractThis paper proposes the implicit social networking as an innovative methodology for approaching consumers who possess information-rich user profiles based on aplethora of online services they use. An implicit social network is not explicitly built by consumers themselves, but implicitly calculated by third parties based on a level of a common interest between consumers (i.e., profile matchmaking). The analysis of aconsumer social network created in such a manner enables discovery of hidden roles, relationships and communities among consumers and represents a basis for provisioning of innovative services (e.g., personalized and/or context-aware services such as recommender systems). The implicit social networking methodology is evaluated through two pilot cases: (i) implicit social networking based on the SmartSocial platform; and (ii) implicit social networking of IPTV users. The generalizability of the implicit social networking is demonstrated through additional example aimed not at external company stakeholders (e.g., company consumers), but at internal stakeholders (i.e., company employees) through the implicit corporate social networking pilot case

    Supporting Mobility with Persistent Notifications in Publish/Subscribe Systems

    No full text
    The paper proposes a novel approach to mobility in publish/subscribe (pub/sub) systems that relies on notification persistency. The existing solutions apply proxy subscribers that take the role of disconnected subscribers, store notifications published during disconnections, and deliver them to subscribers after reconnection to the pub/sub system. The system perceives a constant number of subscribers which is inefficient if it serves a large number of subscribers that are often disconnected. We argue that the system should not be burdened by proxy subscribers during subscriber disconnections, but rather store persistent notifications, and deliver valid notifications to subscribers when they reconnect to the system. Preliminary experiments show that the proposed solution can improve the observed scalability weakness of the existing solutions. 1

    A Methodology for Evaluating Algorithms That Calculate Social Influence in Complex Social Networks

    No full text
    Online social networks are complex systems often involving millions or even billions of users. Understanding the dynamics of a social network requires analysing characteristics of the network (in its entirety) and the users (as individuals). This paper focuses on calculating user’s social influence, which depends on (i) the user’s positioning in the social network and (ii) interactions between the user and all other users in the social network. Given that data on all users in the social network is required to calculate social influence, something not applicable for today’s social networks, alternative approaches relying on a limited set of data on users are necessary. However, these approaches introduce uncertainty in calculating (i.e., predicting) the value of social influence. Hence, a methodology is proposed for evaluating algorithms that calculate social influence in complex social networks; this is done by identifying the most accurate and precise algorithm. The proposed methodology extends the traditional ground truth approach, often used in descriptive statistics and machine learning. Use of the proposed methodology is demonstrated using a case study incorporating four algorithms for calculating a user’s social influence

    8th International Conference KES-AMSTA

    No full text
    Agents and multi-agent systems are related to a modern software paradigm which has long been recognized as a promising technology for constructing autonomous, complex and intelligent systems. The topics covered in this volume include agent-oriented software engineering, agent co-operation, co-ordination, negotiation, organization and communication, distributed problem solving, multi-agent communities, rational and clustering agents, learning paradigms, agent cognitive models, and heterogenous multi-agent environments.   The volume highlights new trends and challenges in agent and multi-agent research and includes 30 papers classified in five specific topics: Modeling and logic agents, Knowledge based agent systems, Cognitive and cooperative multi-agent systems, Agent-based Modeling and Simulation, and Learning Paradigms and Applications: Agent-based Approach. The published papers have been presented at the 8th KES Conference on Agent and Multi-Agent Systems – Technologies and Applications (KES-AMSTA 2014) held in Chania on the island of Crete in Greece in June 2014.   The presented results will be of value to the research community working in the fields of artificial intelligence, collective computational intelligence, robotics, dialogue systems and, in particular, agent and multi-agent systems, technologies and applications.  

    Reasoning for incomplete authorizations

    No full text
    Authorization plays an important role to control access to the system resources. It enforces security mechanism in compliance with the policies and rules specified by the security strategies. However, the security rules may not be always complete. In certain situations, we need to evaluate and reason about an incomplete security domain. In this paper, we propose an approach to reason under incomplete security domain by extended logic programs, discuss properties of unknown and conflict queries, and solve these problems by defining a procedure of evaluating the logic programs
    corecore