You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The term “agent” is one of those catchwords that mean widely differing things to different people. To telecommunications people it is little more than a mobile piece of code that may be executed at any place. At the other extreme, AI people often associate with agents human-like traits such as social behavior. In between, software people view agents as fairly self-contained pieces of software that, at the low end, pretty much act like objects and, at the high end, more or less auto- mously decide when and how to react to stimuli or proactively initiate effects that can be observed from their environment. Software agents are particularly important when it comes to distributed en- ronments. There, much of the communication takes place asynchronously, that is the sequence of events cannot be planned ahead in all detail. Instead, agents are given rules as to how to interpret the current situation and, given a common goal, so that they adjust their response accordingly.
This book constitutes the refereed proceedings of the 17th International Conference on Database and Expert Systems Applications, DEXA 2006. The book presents 90 revised full papers together with 1 invited paper. The papers are organized in topical sections on XML, data and information, data mining and data warehouses, database applications, WWW, bioinformatics, process automation and workflow, knowledge management and expert systems, database theory, query processing, and privacy and security.
This book constitutes the thoroughly refereed proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, IC3K 2017, held in Funchal, Madeira, Portugal, in November 2017. The 19 full papers presented were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on knowledge discovery and information retrieval; knowledge engineering and ontology development; and knowledge management and information sharing.
Peer-to-peer (P2P) computing is currently attracting enormous public attention, spurred by the popularity of file-sharing systems such as Napster, Gnutella, Morpheus, Kaza, and several others. In P2P systems, a very large number of autonomous computing nodes, the peers, rely on each other for services. P2P networks are emerging as a new distributed computing paradigm because of their potential to harness the computing power and the storage capacity of the hosts composing the network, and because they realize a completely open decentralized environment where everybody can join in autonomously. Although researchers working on distributed computing, multiagent systems, databases, and networks h...
DASFAA is an annual international database conference, located in the Asia- Paci?cregion,whichshowcasesstate-of-the-artR & Dactivities in databases- tems and their applications. It provides a forum for technical presentations and discussions among database researchers, developers and users from academia, business and industry. DASFAA 2009, the 14th in the series, was held during April 20-23, 2009 in Brisbane, Australia. In this year, we carefully selected six workshops, each focusing on speci?c research issues that contribute to the main themes of the DASFAA conference. Thisvolumecontainsthe?nalversionsofpapersacceptedforthesesixworkshops that were held in conjunction with DASFAA 2009. They ...
Building research grade multi-agent systems usually involves a broad variety of software infrastructure ingredients like planning, scheduling, coordination, communication, transport, simulation, and module integration technologies and as such constitutes a great challenge to the individual researcher active in the area. The book presents a collection of papers on approaches that will help make deployed and large scale multi-agent systems a reality. The first part focuses on available infrastructure and requirements for constructing research-grade agents and multi-agent systems. The second part deals with support in infrastructure and software development methods for multi-agent systems that can directly support coordination and management of large multi-agent communities; performance analysis and scalability techniques are needed to promote deployment of multi-agent systems to professionals in software engineering and information technology.
Presents the findings of experts and practitioners from the major soft-computing themes Provides an overview of the theory and applications of IMS systems The Area of Intelligence in manufacturing has generated a considerable amount of interest occasionally verging on controversy, both in the research community and in the industrial sector. This proceedings looks at the broad manufacturing domain dealing with both technical and organizational issues, intelligent control is only part, albeit important, of optimal integration and control of intelligent techniques. The importance of creating a synergy of efforts aiming at efficient employment of intelligence in global technological development for manufacturing was recognized by the international IMS (intelligent manufacturing Systems) Initiative and is discussed in this proceedings volume.
This book constitutes the refereed proceedings of the 14th International Conference on Software Reuse for Dynamic Systems in the Cloud and Beyond, ICSR 2015, held in Miami, FL, USA, in January 2015. The 21 revised full papers presented together with 3 revised short papers were carefully reviewed and selected from 60 submissions. The papers cover several software engineering areas where software reuse is important, such as software product lines, domain analysis, open source, components, cloud, quality.
The book presents high-quality, peer-reviewed papers from the FICR International Conference on Rising Threats in Expert Applications and Solutions 2022 organized by IIS (Deemed to be University), Jaipur, Rajasthan, India, during January 7–8, 2022. The volume is a collection of innovative ideas from researchers, scientists, academicians, industry professionals, and students. The book covers a variety of topics, such as expert applications and artificial intelligence/machine learning; advance web technologies such as IoT, big data, cloud computing in expert applications; information and cyber security threats and solutions, multimedia applications in forensics, security and intelligence; advancements in app development; management practices for expert applications; and social and ethical aspects in expert applications through applied sciences.
The debut of small, inexpensive, yet powerful portable computers has coincided with the exponential growth of the Internet, making it possible to access computing resources and information at nearly any location at almost any time. This new trend, mobile computing, is poised to become the main technology driver for a decade to come. There are many