SlideShare une entreprise Scribd logo
1  sur  70
“ Introduction to Autonomous
Mobile Agents"
Juan Ramón Acosta
Network Computing Laboratory
Northeastern University
Introduction to Autonomous Mobile Agents 2
Outline
Introduction
1. Software Agents: Basics
2. Autonomous-Mobile Agents
3. Enabling Technologies
4. Application Engineering
Introduction to Autonomous Mobile Agents 3
Network Computing Lab
Head:
Dr. Dimiter R. Avresky
Members:
Natcho Natchev
Juan Ramón Acosta
Yavutz Varoglu
Marin Marinov
Steve Frechet
Luke Demoraski
Introduction to Autonomous Mobile Agents 4
Our Interests
 Optimization and Performance Analysis
 Fault-Tolerance
 Interconnection Networks
 Distributed Parallel Systems & Network
Computers
 Protocol Validation, Efficient and
Reliable Routing
 Agent Applications
Introduction to Autonomous Mobile Agents 5
Where to apply Agents
 Transparent Resource Allocation
 System Fault Tolerance
 System Performance Improvement
 Dynamic Network Reconfiguration
Introduction to Autonomous Mobile Agents 6
Network Computing
Discipline that studies homogenous and
heterogeneous Multi-computers and
clusters that are built using readily
available components and System Area
Networks (SANs)
Introduction to Autonomous Mobile Agents 7
 Reduce bandwidth usage
 Reduce total completion time
 Reduce latency
 Continue when disconnected
 Balance load
 Dynamically deploy components
Reasons for Using Agents
Introduction to Autonomous Mobile Agents 8
Dataset
Dataset
Dataset
Dynamically
selected
proxy site
Merged and
filtered data
stream
Reason 1:
Reduce Bandwidth Usage
Introduction to Autonomous Mobile Agents 9
Dataset
Dataset
DatasetFact
• Sending an agent avoids remote interaction.
Goal
• Avoiding remote interaction leads to faster
completion times.
Current Systems
• Do not meet the goal in all network environments
• Tradeoff: Local interaction vs. interpretive
overhead
Reason 2: Reduce Total Time
Introduction to Autonomous Mobile Agents 10
Reason 3: Reduce Latency
Sumatra chat server
[RASS97]
1. Observe
high average
latency to
clients
2. Move to
better location
2 to 4 times
smaller latency
in trial runs
Introduction to Autonomous Mobile Agents 11
Reason 4: Disconnected Operation
Dataset
Dataset
Dataset
Dynamically
selected
proxy site
X
Agent continues its task even
if the link to its home machine
goes down (temporarily).
Introduction to Autonomous Mobile Agents 12
Reason 5: Load Balancing
Machine A Machine B
Machine A Machine B
Agent moves to
balance load
Introduction to Autonomous Mobile Agents 13
Reason 6: Dynamic Deployment
Dataset
Dataset
Section 1
Software Agents:
Basics
Introduction to Autonomous Mobile Agents 15
Origins
 In 1970, Carl Hewitt proposed the “Actor Model”
 Actor, a computational Agent with an address and
behavior that communicates with other via
message-passing
 Based on Distributed Artificial Intelligence (DAI) and
Parallel Artificial Intelligence (PAI) theories and
formalisms
 Systems based on Actors became Multi-Agent
Systems (MAS)
Introduction to Autonomous Mobile Agents 16
Definition
Agent is a software/hardware component that
cooperate with other agents, interacts with its
environment, learns, is autonomous and has a
social contract with its user
Requirements:
 Cooperate with other Agents
 Learn (Interact with its Environment)
 Be Autonomous
Introduction to Autonomous Mobile Agents 17
Cooperate Learn
Autonomous
Smart
Agents
Collaborative
Agents
Interface
Agents
Collaborative
Learning
Agents
What is not an Agent
 Anything outside the
intersecting areas is not an
Agent
 Not Agents are: Expert
Systems, Knowledge Systems
and Distributed Processes
 Agents operate at knowledge
level not symbol level
 [Foner93] and Pattie Mae,
“Current commercially available
agents barely justify their name”
Figure 1. Agent Categories [Nwana95]
Introduction to Autonomous Mobile Agents 18
Collaborative Agents
Attributes:
Autonomous, Social Ability,
Responsiveness and Pro-
Activeness
Goals:
Create a system that
Interconnects other agents
to assemble a more complex
Function
Applications:
Distributed Sensor Networks,
Air Traffic Control and Enhance
Reliability
User 1 User 2 User 3
D-B1 D-B2 D-Bn
I-A1 I-A2 I-An
T-A1 T-A2 T-An
Proposed
SolutionTask
Layer 1
Layer 2
Infosphere
Figure 2. The Pleiades Architecture at
Carnegie Mellon University (CMU)
Introduction to Autonomous Mobile Agents 19
Interface Agents
Attributes:
Emphasis on autonomy and
Learning in order to perform
Tasks on behalf of the user
Goals:
Promote cooperation between
end users and software agents
Applications:
Assistants(Travelers,Schedulers)
Memory Aid, Filters, Match
Making, Buying or Selling on
behalf
Application
User A’s
Agent
User’s
Agent
User
Asking
User feedback
Programming by example
Figure 3. How Interface Agents Work
by Pattie Maes
Interacts
Interacts with
Communication
ObservesandImitates
Introduction to Autonomous Mobile Agents 20
Mobile Agents
Attributes:
Computational process capable
of roaming the network gathering
information on behalf of their
Owner to return later “home”
Goals:
Reduce communication costs,
Maximize local resources usage,
Create a flexible distributed
computing environment
Applications:
Personal intelligent
communicators, Emergency Alert
systems, Reconfigurable Mobile
Computing, Network Routing
A
A
Sensor
Sensor
A1
A1
Server
Email Notification
SMS Notification
Install Alarm
Figure 4. Whether Alarm System [Johansen99]
Introduction to Autonomous Mobile Agents 21
InformationInternet Agents
Attributes:
Manage or collate information from
Distributed sources and have
Knowledge where to look for and
find information
Goals:
Provide an expressive integrated
interface to the Internet
Applications:
Filtering Email, Meeting Schedulers,
System Maintenance, Newspapers
online.
User
Information
Agent Program
Lycos
Local cache
WebCrawler North Star Robot
Spider
Mite WAIS
URL Search
DBMS
World Wide
Web
Figure 5. WebBot running in Browser
[Nwana95]
Introduction to Autonomous Mobile Agents 22
Reactive Agents
Attributes:
Respond to stimulus generated
By the environment, manages
complex patterns that emerge
from this behavior
Goals:
Used to build systems with no
internal symbolic models and
Whose “smartness” derives from
interactions
Applications:
Physical Robots, Video games, Virtual
Worlds and Real-Time embedded
systems
Wonder
Avoid Obstacles
Explore
S
E
N
S
I
S
N
G
A
C
T
I
N
G
Figure 6. Brook’s Sumpton Architecture
[Nwana95]
Introduction to Autonomous Mobile Agents 23
Hybrid Agents
Attributes:
Agents constructed combining
one or more of the agent
types mentioned earlier.
Goals:
Maximize the strengths and
minimize deficiencies of some
techniques
Mental Model
World Model
Social Model
SG PS
SG PS
SG PS
Perception Communication Action
Agent KB Agent Central Unit
Cooperative Planing Layer (CPL)
Local Planing Layer (LPL)
Behavior Based Layer (BBL)
World Interface/Body
Figure 7. The InteRRaP Hybrid Architecture
[Nwana95]
Introduction to Autonomous Mobile Agents 24
Sociological View of Agents
 According to Leonard N. Foner, Agents must have a
“Social Contract”
 Contract must include:
 Discourse
 Risk and Trust
 Graceful Degradation
 Anthropomorphism
 Expectation
 Agents and their applications “need to be subject to
same behavioral analysis as human”
 An example: Julia TinyMUD developed at Carnegie
Mellon University can start polemical discussions
Section 2
Autonomous Mobile
Agents
Introduction to Autonomous Mobile Agents 26
Autonomous Mobile Agents
“ Components that operate without direct intervention of
humans, have control over its actions, internal state based
on knowledge and have the capacity to migrate from
machine to machine”
A
A
Sensor
Sensor
A1
A1
Server
Email Notification
SMS Notification
Install Alarm
Figure 8. Whether Alarm System [Johansen99]
Introduction to Autonomous Mobile Agents 27
Attributes
 Behavior can be predicted using beliefs,
desires and rationality
 Make choices based on what they know
about the world
 Roam the network using knowledge
 Create a flexible distributed environment
Introduction to Autonomous Mobile Agents 28
Agents as Intentional Systems
 Agent behavior can be predicted using beliefs,
desires and rationality
 Attitudes to represent an Agent
 Information.- Refers to the information de agent has
about the world it occupies, .e.g. Belief and Knowledge
 Pro-Attitudes.- Those that guide Agent Actions, e.g.
Desire, intention, obligation, commitment, etc.
 Agents make choices and form intentions on the
basis they have about the world, e.g. “stock order
matching rules”
Introduction to Autonomous Mobile Agents 29
Representation of Intentions
 Possible Worlds [Wooldrige94], semantic representation of
beliefs, knowledge. Goals are a set of states considered
possible
 Uses classical prepositional logic extended with two new
operators: = necessarily and = possibly
 Omniscience Problem, An Agent knows all proposition
tautologies then the agent knowledge is closed under
logical consequence
 Alternatives to this problem: Belief and Awareness, and
Deduction Model
 Meta-Languages [Wooldrige94], a syntactic representation
between a Meta-Term and Agent.
Introduction to Autonomous Mobile Agents 30
Mobile Agent Computing Model
Communication Infrastructure
(SCI, Myrinet, ServerNet, VIA, Ethernet, etc…)
Message-Passing
Subsystem
Agent Execution
Environment
Client Application
Environment
Message-Passing
Subsystem
Agent Execution
Environment
Client Application
Environment
RPC, JNI,MPI, PVM,CORBA
Tcl/tk, Java, C++
J.R.Acosta defines the three bottom layers as an Agent Service Broker
Introduction to Autonomous Mobile Agents 31
Agent Process Migration
 Strong Mobility
 Data, Code and
Control Block
 Weak Mobility
 Data and Code
Agent
Run
prc_cn
tl_blck
Ctrl
Blck
I
D
CtrlB
lck
Agent
Susp
I
D
CtrlB
lck
Ctrl
Blck
Agent
Run
Client Application Server Application
7. Resume
1. Migrate
2. Suspend
3.Generate
Bundle
4. Transmit
5. Receive
Bundle
6. Spawn
New
Process
6. Restore
State
8. Interact
Host A Host B
Agent
Susp
Code
Code
Figure 10. Process Migration
Introduction to Autonomous Mobile Agents 32
Advantages
 Access resources locally and eliminates
transfer of intermediate data, incrementing
efficiency
 Do not require permanent connections
 Load Balance
 Reduce Latency
 Portable and secure (Uses interpreted
languages)
Section 3
Enabling Technologies
Introduction to Autonomous Mobile Agents 34
Aglets
• Java
• Weak mobility
• Event-driven programming model
(dispatch, onDispatching, onArrival, …)
• Persistent store
• “Proxies” for location transparency
• Machine protection
http://www.trl.ibm.co.jp/aglets/IBM
Introduction to Autonomous Mobile Agents 35
Jumping Beans
Central
Domain
Server
Agency
“Mini-server”
Agency Agency
Jump
through
central
server
• Java
• Weak mobility
• Central server for tracking,
managing and authenticating
agents (but also failure point
and bottleneck)
• Persistent store
• Machine protection
http://www.JumpingBeans.com/
Ad Astra Engineering
Introduction to Autonomous Mobile Agents 36
Voyager
• Java
• Built on top of CORBA
• Weak mobility
• Persistent store
• Federated directory service and group communication
(multicast)
• Machine protection
ObjectSpace
http://www.objectspace.com/products/
Introduction to Autonomous Mobile Agents 37
Tacoma
• C, Tcl/Tk, Scheme, Python, Perl (public
release), several more internally
• Weak mobility
• Single, simple abstraction: meet
– Easy to add a new language
– Less opportunity for optimization
• Machine protection
University of Tromsø / Cornell University
http://www.tacoma.cs.uit.no/
Introduction to Autonomous Mobile Agents 38
D’Agents (a.k.a Agent Tcl)
 Started by Robert
Gray in Spring, 1994
 Only system with
strong mobility
 Multiple Languages
 Tcl, Java and Schema
 Support Services
 Directory service
 Tracker
 Mobile Computing
 Performance
 Improving
 Communication and
Migrations are
Expensive
 Security
 Machine Protection
 Agent Protection in
Transit
 No Agent Protection
while on a Machine
Introduction to Autonomous Mobile Agents 39
D’Agents: Architecture
Figure 11. Agent Tcl Architecture [Gray97]
Transport (TCP/IP)
Server Engine
Java
VM
Scheme
Interp
Tcl
Interp
Agents
VM / Interpreter
Security
State
Capture
VM
Server
stubs
Introduction to Autonomous Mobile Agents 40
D’Agents: Example
Machine Z
Parent
Machine A
ChildChild
1. Submit
child
...
2. Jump
3. Send
results
Introduction to Autonomous Mobile Agents 41
D’Agents: Tcl Programming
proc child {machines} {
global agent
# migrate through machines
set results {}
foreach machine $machines {
# do task, update results
agent_jump $machine
}
# send back results and end
agent_send 
$agent(root) 0 $results
agent_end
}
agent_begin
# submit child
set machines {A B …}
agent_submit 
$agent(local-server) 
-procs child 
-vars machines 
-script {child $machines}
# get results
agent_receive 
code results -blocking
puts $results
agent_end
Child Agent Parent Agent
Introduction to Autonomous Mobile Agents 42
D’Agents: Java Programming
// Parent Agent
// register with the agent system
Agent a = new Agent();
AgentId id = a.begin (10); // timeout after 10 seconds
// submit the child agent
Vector machines = new Vector();
machines.addElement (new String (“A”));
machines.addElement (new String (”B"));
ChildAgent childAgent = new ChildAgent (machines);
AgentId childId = a.submit (“localhost”, childAgent, 10);
// wait for and display the result and then end
RecMessage result = a.receive (10);
System.out.println (result.getMessage());
a.end (10);
Introduction to Autonomous Mobile Agents 43
D’Agents: Java Programming
(Cont…)
class ChildAgent extends AgentEntryPoint {
private Vector m_machines; // machine list
public ChildAgent (Vector machines)
{ m_machines = machines; }
public void run (Agent a) {
String results = "";
// migrate through all the machines in the list
for (int i = 0; i < m_machines.size(); ++i) {
//do tasks, update results
String machine = (String) m_machines.elementAt (i);
a.jump (machine, 10);
}
// send back result and exit
Message message = new Message (0, results);
a.send (a.getRootId(), message, 10); a.end (10);
}
}
Introduction to Autonomous Mobile Agents 44
D’Agents: Performance
0
20
40
60
80
100
120
140
160
180
200
0 5000 10000 15000 20000 25000 30000
Payload or Message Size (bytes)
Time(milliseconds) D’Agents (Migration)
D’Agents (Messages)
TCP/IP connection
10 Mb/s
Network
Figure 12. Base Performance [Gray2000]
Introduction to Autonomous Mobile Agents 45
What Lowers Performance?
1. All messages through server (plus TCP/IP)
Server
Machine A Machine B
TCP/IP
connection Server
Machine A
Server
Tcl
Interp
TCP/IP
connection
jump
2. Interpreter initialization (plus TCP/IP)
Introduction to Autonomous Mobile Agents 46
D’Agents: Security
 Main concerns
 Protect the Machine from an Agent
 Protect Agents
 Protect Group of Machines
 Authentication
 RSA public-key cryptography to authenticate
agent’s owners
 Pretty Good Privacy (PGP) algorithm for digital
signatures and encryption for Agent migration and
communication
Introduction to Autonomous Mobile Agents 47
Filesystem
Manager
D’Agents: Protecting the Machine
Server
kernel
Security
Files
Tcl Agent
(digitally signed)
1. Authenticate
2. Accept or reject
3. Resume execution
4. open tutorial.ppt r
5. Access request (read)
and security vector
{owner, untrusted machines?}
6. Yes / no /
quantity
7. If yes,
open
Tcl
Interpeter
Introduction to Autonomous Mobile Agents 48
Going Forward
 Improve access restrictions and
resource scheduling for most
application environments
 Remote communication as fast as RPC
 Just-in-Time compilation with code
cashing
Section 4
Application Engineering
Introduction to Autonomous Mobile Agents 50
Application Engineering
 Agent Oriented Software Engineering
 Intelligent Software Engineering
 Agent Design Patterns
Introduction to Autonomous Mobile Agents 51
Agent Oriented Software
Engineering
 Specifies that a complex system can be
represented as a hierarchy
 Agents are:
 Problem solving entities in an environment
 Fulfill a specific role
 Control both their internal state and behavior
 Adopt goals and take initiative to satisfy their
design objectives
Introduction to Autonomous Mobile Agents 52
Agent Oriented Software
Cycle
Implementation:
Execute,
Compile
Verification:
Axiomatic
&
Semantic
Specification:
Beliefs, goals,
actions and
continuous interaction
Introduction to Autonomous Mobile Agents 53
Intelligent Software Engineering
[Deugo99]
 Concerned with the creation of principles to
describe intelligent software patterns
 Combine Patterns and Artificial Intelligence
Techniques
 Produce Complex and Intelligent Software
Products
 Agent Patters are Intelligent Software
Patterns
Introduction to Autonomous Mobile Agents 54
Design Patterns
 Created by Christopher Alexander. Applied to
Architecture
 Relation between a problem, its context and the
solution
 Format:
 Name .- Descriptive name for the pattern
 Problem.- Clear description of the problem to be solved
 Context.- Situation when the pattern might be applied
 Forces .- Items that restrict or influence when to apply
the pattern
 Solution.- Solution in the context that balances the forces
Introduction to Autonomous Mobile Agents 55
Agent Design Patterns
 Architectural Patterns, describe agent system
architecture
 Interaction Patterns, describe how agents
communicate with each other
 Agent Mobility Patterns, describe how agent
roam the network
Introduction to Autonomous Mobile Agents 56
Architectural Patterns
Name:
Layered Agent Pattern
Problem:
What software architecture best
supports the behavior of agents
Forces:
 Agent system spans several levels of
abstraction
 Software must include all aspects of
agency
 Be able to address simple and
sophisticated agent behavior
Solution:
Agents and the system needs are
discomposed into six layers
Mobility
Collaboration
Actions
Reasoning
Beliefs
Sensory
Figure 13. Layered Agent pattern,
[Kendall98]
Introduction to Autonomous Mobile Agents 57
Interaction Patterns
 Direct Coupling
 Point to point, Ack/Req, Agents do not move
 Proxy Agent
 Communication Session
 Badges
 Event Dispatcher
Introduction to Autonomous Mobile Agents 58
Proxy Agent Pattern [Deugo99]
Name:
Proxy Agent Pattern
Problem:
If the Agent sending a message does not
expect the receiving Agent to move or
Direct Coupling pattern is not applicable
for performance reasons, how do mobile
agent communicate with others ?
Forces:
 Mobile Agents change often position
 Communication peer-to-peer
 Required communication with static
Agents
Client Agent
Proxy Agent
Server Agent
Figure 14. Proxy Agent pattern
Solution: When Agent moves
away, agent creates proxy
Agent at its home location
Introduction to Autonomous Mobile Agents 59
Badges Pattern [Deugo99]
Name:
Badges Pattern
Problem:
How can an Agent find a suitable
communicating Agent without
specifying a concrete Agent?
Forces:
 Communicating Agents are not known
in advance and can change
 Design must be flexible and general
 After identifying communicating agents
communication should be direct
Solution:
Attach badges to agents. A place provides
a service to find a local agent
carrying certain badge.
Badge C
Badge B
Badge A
Look for Badge B
Figure 15. Badges Pattern
After finding an available
agent communication starts
Introduction to Autonomous Mobile Agents 60
Agent Mobility Patterns
 By Passer
 Commuter
 Interface
 Isolator
 Monitor
 Rover
Introduction to Autonomous Mobile Agents 61
By Passer Pattern [Hung2002]
Agents
 Used to avoid unreliable
links
 Works on behalf of the
client
 When finished it returns
to home
 If an Agent does not
return the pattern is
then called Commuter
Serve
r
AgentClient
Figure 16. By Passer Pattern
Introduction to Autonomous Mobile Agents 62
Interface Pattern [Hung2002]
Agents
 Act as intermediary
between a client and a
server
 Execute anywhere
 All communication
between client and
server goes through the
Agent
 If simple messaging
goes through the Agent
pattern is called Monitor
Server
AgentClient
Figure 17. Interface Pattern
Introduction to Autonomous Mobile Agents 63
Rover Pattern [Hung2002]
Agents
 Visits several sites
in sequence using
an itinerary
 Streamline recovery
model
 Helps to reduce
network congestion
Server
AgentClient
Server
Agent
Server
Agent
Agent
Figure 18. Rover Pattern
Introduction to Autonomous Mobile Agents 64
Performance of Agent
Patterns
Stock
Server
Roving
Agent
Roving
Agent
Roving
Agent
Static
Agent
Trader Host Roving Trader
Success Rate
95% Confidence
Interval
Host A 50.8% ±1.4%
Host B 100.0% ±0.0%
Host C 100.0% ±0.0%
Host A
Host B
Host C
Figure 19. Trading
System
[Hung2002]
Agents compete
to match the best
sale order of an
specific Stock
Symbol
Introduction to Autonomous Mobile Agents 65
Case Study
 Current Architecture
 Pattern Identification
 Agent Architecture
Self-Organized Multi-Modular Robotic
Control
Dr. José Negrete-Martínez
Facultad de Física e Inteligencia Artificial
Universidad Veracruzana, México
Figure 20. Modular Robot [Negrete 2002]
Introduction to Autonomous Mobile Agents 66
Case Study: Current Architecture
Motor(j)
B
DS Rotating(j)
m Payoff(j)
IRS AFD AD
n
Motor(j)
B
DS Probing(j)
Payoff(i)IRS AFD AD
SoftwareMechatronic
IRS .- Infrared Square Wave
DS .- Computer-servo’s interface
AFD.- Amplifier-Filter-Detector Circuit
AD.- Interface between AFD and
Computer
DS.- Computer-servo’s Interface
m,n .- Memory Register
Payoff(k).- function that calculates the sign of the difference
of light intensity before and after the module’s motor action
Decision(k).-function that adds a signed step to the present
position of the Motor(i). The Decision(i) function calls the
Payoff(i) function
Figure 21. Modular Architecture
[Negrete 2002]
Introduction to Autonomous Mobile Agents 67
Case Study: Pattern Identification
 Layered Agent Pattern, Use of Agent System that
supports mobility
 Monitor Pattern, Data Acquisition Agent in charge of
receiving Infra Red Signal and determining variation
on light intensity
 Commuter Pattern, Action Agents in charge of
executing the ‘Two Arm Bandit’ learning algorithm that
inputs the Payoff value and invoking and Orientation
Agent
 Event Dispatcher Pattern, Action Agent to report step
motor movement
 Interface Pattern, Motor Driver Agents that interfaces
with servo motor interface and a Action Agent
Introduction to Autonomous Mobile Agents 68
Desition
Agent
Case Study: Agent Architecture
Motor Driver
Agent
Action
Agent
SoftwareMechatronic
Orientation
Agent
DS
IRS AFD AD
Motor
moveMotorEvent
executeOtherAction
makeDesition
determineOrintation
haltActioEvent
newReading
stepMotor
Figure 10. Agent Architecture
Data
Aquisition
Agent
Introduction to Autonomous Mobile Agents 69
Case Study: Results
 Architecture is scalable and distributed
 Allows parallel continuous activity
 Remains Modular and better separation of
concerns
 Abstracts hardware Interfaces, more generic
 Enables System for Distributed Network or
Grid Computing
Introduction to Autonomous Mobile Agents 70
Conclusions
Agent technology promises big improvements
over traditional technologies and positions
itself as the future technology for complex software
systems.
However, as any other technology, it is only
good if it profs itself useful and people is willing
to spend time with it to solve problems
Otherwise it is a nice try

Contenu connexe

Tendances

Lecture 5 - Agent communication
Lecture 5 - Agent communicationLecture 5 - Agent communication
Lecture 5 - Agent communicationAntonio Moreno
 
Multi-agent systems
Multi-agent systemsMulti-agent systems
Multi-agent systemsR A Akerkar
 
BBL multi agent systems
BBL multi agent systemsBBL multi agent systems
BBL multi agent systemsCédric BURON
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
 
Explain Communication among agents in Artificial Intelligence
Explain Communication among agents in Artificial IntelligenceExplain Communication among agents in Artificial Intelligence
Explain Communication among agents in Artificial IntelligenceGurpreet singh
 
Using Communication to Reduce Locality in Multi-Robo
Using Communication to Reduce Locality in Multi-RoboUsing Communication to Reduce Locality in Multi-Robo
Using Communication to Reduce Locality in Multi-Roboderakberreyesa
 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersLeMeniz Infotech
 
Lecture 4- Agent types
Lecture 4- Agent typesLecture 4- Agent types
Lecture 4- Agent typesAntonio Moreno
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peerSnehith
 
Introduction to agents and multi-agent systems
Introduction to agents and multi-agent systemsIntroduction to agents and multi-agent systems
Introduction to agents and multi-agent systemsAntonio Moreno
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSIJNSA Journal
 
MAS course Lect13 industrial applications
MAS course Lect13 industrial applicationsMAS course Lect13 industrial applications
MAS course Lect13 industrial applicationsAntonio Moreno
 
Software Agents & Their Taxonomy | Ecommerce BBA Handout
Software Agents & Their Taxonomy | Ecommerce BBA HandoutSoftware Agents & Their Taxonomy | Ecommerce BBA Handout
Software Agents & Their Taxonomy | Ecommerce BBA HandoutHem Pokhrel
 
A framework for an Operating System-based Mobile Agent Interoperability
A framework for an Operating System-based Mobile Agent InteroperabilityA framework for an Operating System-based Mobile Agent Interoperability
A framework for an Operating System-based Mobile Agent InteroperabilityIOSR Journals
 

Tendances (20)

Lecture 5 - Agent communication
Lecture 5 - Agent communicationLecture 5 - Agent communication
Lecture 5 - Agent communication
 
Multi-agent systems
Multi-agent systemsMulti-agent systems
Multi-agent systems
 
BBL multi agent systems
BBL multi agent systemsBBL multi agent systems
BBL multi agent systems
 
Networking java titles Adrit Solution
Networking java titles Adrit SolutionNetworking java titles Adrit Solution
Networking java titles Adrit Solution
 
Software agents
Software agentsSoftware agents
Software agents
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
 
Explain Communication among agents in Artificial Intelligence
Explain Communication among agents in Artificial IntelligenceExplain Communication among agents in Artificial Intelligence
Explain Communication among agents in Artificial Intelligence
 
Agent-based System - Introduction
Agent-based System - IntroductionAgent-based System - Introduction
Agent-based System - Introduction
 
Using Communication to Reduce Locality in Multi-Robo
Using Communication to Reduce Locality in Multi-RoboUsing Communication to Reduce Locality in Multi-Robo
Using Communication to Reduce Locality in Multi-Robo
 
Interface agents
Interface agentsInterface agents
Interface agents
 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile users
 
Lecture 4- Agent types
Lecture 4- Agent typesLecture 4- Agent types
Lecture 4- Agent types
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peer
 
Introduction to agents and multi-agent systems
Introduction to agents and multi-agent systemsIntroduction to agents and multi-agent systems
Introduction to agents and multi-agent systems
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
 
Software agents
Software agentsSoftware agents
Software agents
 
MAS course Lect13 industrial applications
MAS course Lect13 industrial applicationsMAS course Lect13 industrial applications
MAS course Lect13 industrial applications
 
Software Agents & Their Taxonomy | Ecommerce BBA Handout
Software Agents & Their Taxonomy | Ecommerce BBA HandoutSoftware Agents & Their Taxonomy | Ecommerce BBA Handout
Software Agents & Their Taxonomy | Ecommerce BBA Handout
 
A framework for an Operating System-based Mobile Agent Interoperability
A framework for an Operating System-based Mobile Agent InteroperabilityA framework for an Operating System-based Mobile Agent Interoperability
A framework for an Operating System-based Mobile Agent Interoperability
 

Similaire à Introductionto agents

Multi agent good kabisa
Multi agent good kabisaMulti agent good kabisa
Multi agent good kabisaJovenary Muta
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsCSCJournals
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromeSAT Publishing House
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Mobile Crowdsensing with Mobile Agents
Mobile Crowdsensing with Mobile AgentsMobile Crowdsensing with Mobile Agents
Mobile Crowdsensing with Mobile AgentsTeemu Leppänen
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptxyudragispi
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Laura Arrigo
 
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...IJNSA Journal
 
Robotics and agents
Robotics and agentsRobotics and agents
Robotics and agentsritahani
 
Intelligent Buildings: Foundation for Intelligent Physical Agents
Intelligent Buildings: Foundation for Intelligent Physical AgentsIntelligent Buildings: Foundation for Intelligent Physical Agents
Intelligent Buildings: Foundation for Intelligent Physical AgentsIJERA Editor
 
journalism research
journalism researchjournalism research
journalism researchrikaseorika
 

Similaire à Introductionto agents (20)

P0704085089
P0704085089P0704085089
P0704085089
 
Agent-based System - Introduction
Agent-based System - IntroductionAgent-based System - Introduction
Agent-based System - Introduction
 
Multi agent good kabisa
Multi agent good kabisaMulti agent good kabisa
Multi agent good kabisa
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
 
Collcom2005 agent basedft
Collcom2005 agent basedftCollcom2005 agent basedft
Collcom2005 agent basedft
 
Mobile Agents
Mobile AgentsMobile Agents
Mobile Agents
 
Mobile Agents
Mobile AgentsMobile Agents
Mobile Agents
 
Mobile agents
Mobile agentsMobile agents
Mobile agents
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Mobile Crowdsensing with Mobile Agents
Mobile Crowdsensing with Mobile AgentsMobile Crowdsensing with Mobile Agents
Mobile Crowdsensing with Mobile Agents
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptx
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12
 
ICS2208 Lecture4
ICS2208 Lecture4ICS2208 Lecture4
ICS2208 Lecture4
 
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
 
Download
DownloadDownload
Download
 
Y04405144148
Y04405144148Y04405144148
Y04405144148
 
Robotics and agents
Robotics and agentsRobotics and agents
Robotics and agents
 
Intelligent Buildings: Foundation for Intelligent Physical Agents
Intelligent Buildings: Foundation for Intelligent Physical AgentsIntelligent Buildings: Foundation for Intelligent Physical Agents
Intelligent Buildings: Foundation for Intelligent Physical Agents
 
journalism research
journalism researchjournalism research
journalism research
 

Dernier

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Introductionto agents

  • 1. “ Introduction to Autonomous Mobile Agents" Juan Ramón Acosta Network Computing Laboratory Northeastern University
  • 2. Introduction to Autonomous Mobile Agents 2 Outline Introduction 1. Software Agents: Basics 2. Autonomous-Mobile Agents 3. Enabling Technologies 4. Application Engineering
  • 3. Introduction to Autonomous Mobile Agents 3 Network Computing Lab Head: Dr. Dimiter R. Avresky Members: Natcho Natchev Juan Ramón Acosta Yavutz Varoglu Marin Marinov Steve Frechet Luke Demoraski
  • 4. Introduction to Autonomous Mobile Agents 4 Our Interests  Optimization and Performance Analysis  Fault-Tolerance  Interconnection Networks  Distributed Parallel Systems & Network Computers  Protocol Validation, Efficient and Reliable Routing  Agent Applications
  • 5. Introduction to Autonomous Mobile Agents 5 Where to apply Agents  Transparent Resource Allocation  System Fault Tolerance  System Performance Improvement  Dynamic Network Reconfiguration
  • 6. Introduction to Autonomous Mobile Agents 6 Network Computing Discipline that studies homogenous and heterogeneous Multi-computers and clusters that are built using readily available components and System Area Networks (SANs)
  • 7. Introduction to Autonomous Mobile Agents 7  Reduce bandwidth usage  Reduce total completion time  Reduce latency  Continue when disconnected  Balance load  Dynamically deploy components Reasons for Using Agents
  • 8. Introduction to Autonomous Mobile Agents 8 Dataset Dataset Dataset Dynamically selected proxy site Merged and filtered data stream Reason 1: Reduce Bandwidth Usage
  • 9. Introduction to Autonomous Mobile Agents 9 Dataset Dataset DatasetFact • Sending an agent avoids remote interaction. Goal • Avoiding remote interaction leads to faster completion times. Current Systems • Do not meet the goal in all network environments • Tradeoff: Local interaction vs. interpretive overhead Reason 2: Reduce Total Time
  • 10. Introduction to Autonomous Mobile Agents 10 Reason 3: Reduce Latency Sumatra chat server [RASS97] 1. Observe high average latency to clients 2. Move to better location 2 to 4 times smaller latency in trial runs
  • 11. Introduction to Autonomous Mobile Agents 11 Reason 4: Disconnected Operation Dataset Dataset Dataset Dynamically selected proxy site X Agent continues its task even if the link to its home machine goes down (temporarily).
  • 12. Introduction to Autonomous Mobile Agents 12 Reason 5: Load Balancing Machine A Machine B Machine A Machine B Agent moves to balance load
  • 13. Introduction to Autonomous Mobile Agents 13 Reason 6: Dynamic Deployment Dataset Dataset
  • 15. Introduction to Autonomous Mobile Agents 15 Origins  In 1970, Carl Hewitt proposed the “Actor Model”  Actor, a computational Agent with an address and behavior that communicates with other via message-passing  Based on Distributed Artificial Intelligence (DAI) and Parallel Artificial Intelligence (PAI) theories and formalisms  Systems based on Actors became Multi-Agent Systems (MAS)
  • 16. Introduction to Autonomous Mobile Agents 16 Definition Agent is a software/hardware component that cooperate with other agents, interacts with its environment, learns, is autonomous and has a social contract with its user Requirements:  Cooperate with other Agents  Learn (Interact with its Environment)  Be Autonomous
  • 17. Introduction to Autonomous Mobile Agents 17 Cooperate Learn Autonomous Smart Agents Collaborative Agents Interface Agents Collaborative Learning Agents What is not an Agent  Anything outside the intersecting areas is not an Agent  Not Agents are: Expert Systems, Knowledge Systems and Distributed Processes  Agents operate at knowledge level not symbol level  [Foner93] and Pattie Mae, “Current commercially available agents barely justify their name” Figure 1. Agent Categories [Nwana95]
  • 18. Introduction to Autonomous Mobile Agents 18 Collaborative Agents Attributes: Autonomous, Social Ability, Responsiveness and Pro- Activeness Goals: Create a system that Interconnects other agents to assemble a more complex Function Applications: Distributed Sensor Networks, Air Traffic Control and Enhance Reliability User 1 User 2 User 3 D-B1 D-B2 D-Bn I-A1 I-A2 I-An T-A1 T-A2 T-An Proposed SolutionTask Layer 1 Layer 2 Infosphere Figure 2. The Pleiades Architecture at Carnegie Mellon University (CMU)
  • 19. Introduction to Autonomous Mobile Agents 19 Interface Agents Attributes: Emphasis on autonomy and Learning in order to perform Tasks on behalf of the user Goals: Promote cooperation between end users and software agents Applications: Assistants(Travelers,Schedulers) Memory Aid, Filters, Match Making, Buying or Selling on behalf Application User A’s Agent User’s Agent User Asking User feedback Programming by example Figure 3. How Interface Agents Work by Pattie Maes Interacts Interacts with Communication ObservesandImitates
  • 20. Introduction to Autonomous Mobile Agents 20 Mobile Agents Attributes: Computational process capable of roaming the network gathering information on behalf of their Owner to return later “home” Goals: Reduce communication costs, Maximize local resources usage, Create a flexible distributed computing environment Applications: Personal intelligent communicators, Emergency Alert systems, Reconfigurable Mobile Computing, Network Routing A A Sensor Sensor A1 A1 Server Email Notification SMS Notification Install Alarm Figure 4. Whether Alarm System [Johansen99]
  • 21. Introduction to Autonomous Mobile Agents 21 InformationInternet Agents Attributes: Manage or collate information from Distributed sources and have Knowledge where to look for and find information Goals: Provide an expressive integrated interface to the Internet Applications: Filtering Email, Meeting Schedulers, System Maintenance, Newspapers online. User Information Agent Program Lycos Local cache WebCrawler North Star Robot Spider Mite WAIS URL Search DBMS World Wide Web Figure 5. WebBot running in Browser [Nwana95]
  • 22. Introduction to Autonomous Mobile Agents 22 Reactive Agents Attributes: Respond to stimulus generated By the environment, manages complex patterns that emerge from this behavior Goals: Used to build systems with no internal symbolic models and Whose “smartness” derives from interactions Applications: Physical Robots, Video games, Virtual Worlds and Real-Time embedded systems Wonder Avoid Obstacles Explore S E N S I S N G A C T I N G Figure 6. Brook’s Sumpton Architecture [Nwana95]
  • 23. Introduction to Autonomous Mobile Agents 23 Hybrid Agents Attributes: Agents constructed combining one or more of the agent types mentioned earlier. Goals: Maximize the strengths and minimize deficiencies of some techniques Mental Model World Model Social Model SG PS SG PS SG PS Perception Communication Action Agent KB Agent Central Unit Cooperative Planing Layer (CPL) Local Planing Layer (LPL) Behavior Based Layer (BBL) World Interface/Body Figure 7. The InteRRaP Hybrid Architecture [Nwana95]
  • 24. Introduction to Autonomous Mobile Agents 24 Sociological View of Agents  According to Leonard N. Foner, Agents must have a “Social Contract”  Contract must include:  Discourse  Risk and Trust  Graceful Degradation  Anthropomorphism  Expectation  Agents and their applications “need to be subject to same behavioral analysis as human”  An example: Julia TinyMUD developed at Carnegie Mellon University can start polemical discussions
  • 26. Introduction to Autonomous Mobile Agents 26 Autonomous Mobile Agents “ Components that operate without direct intervention of humans, have control over its actions, internal state based on knowledge and have the capacity to migrate from machine to machine” A A Sensor Sensor A1 A1 Server Email Notification SMS Notification Install Alarm Figure 8. Whether Alarm System [Johansen99]
  • 27. Introduction to Autonomous Mobile Agents 27 Attributes  Behavior can be predicted using beliefs, desires and rationality  Make choices based on what they know about the world  Roam the network using knowledge  Create a flexible distributed environment
  • 28. Introduction to Autonomous Mobile Agents 28 Agents as Intentional Systems  Agent behavior can be predicted using beliefs, desires and rationality  Attitudes to represent an Agent  Information.- Refers to the information de agent has about the world it occupies, .e.g. Belief and Knowledge  Pro-Attitudes.- Those that guide Agent Actions, e.g. Desire, intention, obligation, commitment, etc.  Agents make choices and form intentions on the basis they have about the world, e.g. “stock order matching rules”
  • 29. Introduction to Autonomous Mobile Agents 29 Representation of Intentions  Possible Worlds [Wooldrige94], semantic representation of beliefs, knowledge. Goals are a set of states considered possible  Uses classical prepositional logic extended with two new operators: = necessarily and = possibly  Omniscience Problem, An Agent knows all proposition tautologies then the agent knowledge is closed under logical consequence  Alternatives to this problem: Belief and Awareness, and Deduction Model  Meta-Languages [Wooldrige94], a syntactic representation between a Meta-Term and Agent.
  • 30. Introduction to Autonomous Mobile Agents 30 Mobile Agent Computing Model Communication Infrastructure (SCI, Myrinet, ServerNet, VIA, Ethernet, etc…) Message-Passing Subsystem Agent Execution Environment Client Application Environment Message-Passing Subsystem Agent Execution Environment Client Application Environment RPC, JNI,MPI, PVM,CORBA Tcl/tk, Java, C++ J.R.Acosta defines the three bottom layers as an Agent Service Broker
  • 31. Introduction to Autonomous Mobile Agents 31 Agent Process Migration  Strong Mobility  Data, Code and Control Block  Weak Mobility  Data and Code Agent Run prc_cn tl_blck Ctrl Blck I D CtrlB lck Agent Susp I D CtrlB lck Ctrl Blck Agent Run Client Application Server Application 7. Resume 1. Migrate 2. Suspend 3.Generate Bundle 4. Transmit 5. Receive Bundle 6. Spawn New Process 6. Restore State 8. Interact Host A Host B Agent Susp Code Code Figure 10. Process Migration
  • 32. Introduction to Autonomous Mobile Agents 32 Advantages  Access resources locally and eliminates transfer of intermediate data, incrementing efficiency  Do not require permanent connections  Load Balance  Reduce Latency  Portable and secure (Uses interpreted languages)
  • 34. Introduction to Autonomous Mobile Agents 34 Aglets • Java • Weak mobility • Event-driven programming model (dispatch, onDispatching, onArrival, …) • Persistent store • “Proxies” for location transparency • Machine protection http://www.trl.ibm.co.jp/aglets/IBM
  • 35. Introduction to Autonomous Mobile Agents 35 Jumping Beans Central Domain Server Agency “Mini-server” Agency Agency Jump through central server • Java • Weak mobility • Central server for tracking, managing and authenticating agents (but also failure point and bottleneck) • Persistent store • Machine protection http://www.JumpingBeans.com/ Ad Astra Engineering
  • 36. Introduction to Autonomous Mobile Agents 36 Voyager • Java • Built on top of CORBA • Weak mobility • Persistent store • Federated directory service and group communication (multicast) • Machine protection ObjectSpace http://www.objectspace.com/products/
  • 37. Introduction to Autonomous Mobile Agents 37 Tacoma • C, Tcl/Tk, Scheme, Python, Perl (public release), several more internally • Weak mobility • Single, simple abstraction: meet – Easy to add a new language – Less opportunity for optimization • Machine protection University of Tromsø / Cornell University http://www.tacoma.cs.uit.no/
  • 38. Introduction to Autonomous Mobile Agents 38 D’Agents (a.k.a Agent Tcl)  Started by Robert Gray in Spring, 1994  Only system with strong mobility  Multiple Languages  Tcl, Java and Schema  Support Services  Directory service  Tracker  Mobile Computing  Performance  Improving  Communication and Migrations are Expensive  Security  Machine Protection  Agent Protection in Transit  No Agent Protection while on a Machine
  • 39. Introduction to Autonomous Mobile Agents 39 D’Agents: Architecture Figure 11. Agent Tcl Architecture [Gray97] Transport (TCP/IP) Server Engine Java VM Scheme Interp Tcl Interp Agents VM / Interpreter Security State Capture VM Server stubs
  • 40. Introduction to Autonomous Mobile Agents 40 D’Agents: Example Machine Z Parent Machine A ChildChild 1. Submit child ... 2. Jump 3. Send results
  • 41. Introduction to Autonomous Mobile Agents 41 D’Agents: Tcl Programming proc child {machines} { global agent # migrate through machines set results {} foreach machine $machines { # do task, update results agent_jump $machine } # send back results and end agent_send $agent(root) 0 $results agent_end } agent_begin # submit child set machines {A B …} agent_submit $agent(local-server) -procs child -vars machines -script {child $machines} # get results agent_receive code results -blocking puts $results agent_end Child Agent Parent Agent
  • 42. Introduction to Autonomous Mobile Agents 42 D’Agents: Java Programming // Parent Agent // register with the agent system Agent a = new Agent(); AgentId id = a.begin (10); // timeout after 10 seconds // submit the child agent Vector machines = new Vector(); machines.addElement (new String (“A”)); machines.addElement (new String (”B")); ChildAgent childAgent = new ChildAgent (machines); AgentId childId = a.submit (“localhost”, childAgent, 10); // wait for and display the result and then end RecMessage result = a.receive (10); System.out.println (result.getMessage()); a.end (10);
  • 43. Introduction to Autonomous Mobile Agents 43 D’Agents: Java Programming (Cont…) class ChildAgent extends AgentEntryPoint { private Vector m_machines; // machine list public ChildAgent (Vector machines) { m_machines = machines; } public void run (Agent a) { String results = ""; // migrate through all the machines in the list for (int i = 0; i < m_machines.size(); ++i) { //do tasks, update results String machine = (String) m_machines.elementAt (i); a.jump (machine, 10); } // send back result and exit Message message = new Message (0, results); a.send (a.getRootId(), message, 10); a.end (10); } }
  • 44. Introduction to Autonomous Mobile Agents 44 D’Agents: Performance 0 20 40 60 80 100 120 140 160 180 200 0 5000 10000 15000 20000 25000 30000 Payload or Message Size (bytes) Time(milliseconds) D’Agents (Migration) D’Agents (Messages) TCP/IP connection 10 Mb/s Network Figure 12. Base Performance [Gray2000]
  • 45. Introduction to Autonomous Mobile Agents 45 What Lowers Performance? 1. All messages through server (plus TCP/IP) Server Machine A Machine B TCP/IP connection Server Machine A Server Tcl Interp TCP/IP connection jump 2. Interpreter initialization (plus TCP/IP)
  • 46. Introduction to Autonomous Mobile Agents 46 D’Agents: Security  Main concerns  Protect the Machine from an Agent  Protect Agents  Protect Group of Machines  Authentication  RSA public-key cryptography to authenticate agent’s owners  Pretty Good Privacy (PGP) algorithm for digital signatures and encryption for Agent migration and communication
  • 47. Introduction to Autonomous Mobile Agents 47 Filesystem Manager D’Agents: Protecting the Machine Server kernel Security Files Tcl Agent (digitally signed) 1. Authenticate 2. Accept or reject 3. Resume execution 4. open tutorial.ppt r 5. Access request (read) and security vector {owner, untrusted machines?} 6. Yes / no / quantity 7. If yes, open Tcl Interpeter
  • 48. Introduction to Autonomous Mobile Agents 48 Going Forward  Improve access restrictions and resource scheduling for most application environments  Remote communication as fast as RPC  Just-in-Time compilation with code cashing
  • 50. Introduction to Autonomous Mobile Agents 50 Application Engineering  Agent Oriented Software Engineering  Intelligent Software Engineering  Agent Design Patterns
  • 51. Introduction to Autonomous Mobile Agents 51 Agent Oriented Software Engineering  Specifies that a complex system can be represented as a hierarchy  Agents are:  Problem solving entities in an environment  Fulfill a specific role  Control both their internal state and behavior  Adopt goals and take initiative to satisfy their design objectives
  • 52. Introduction to Autonomous Mobile Agents 52 Agent Oriented Software Cycle Implementation: Execute, Compile Verification: Axiomatic & Semantic Specification: Beliefs, goals, actions and continuous interaction
  • 53. Introduction to Autonomous Mobile Agents 53 Intelligent Software Engineering [Deugo99]  Concerned with the creation of principles to describe intelligent software patterns  Combine Patterns and Artificial Intelligence Techniques  Produce Complex and Intelligent Software Products  Agent Patters are Intelligent Software Patterns
  • 54. Introduction to Autonomous Mobile Agents 54 Design Patterns  Created by Christopher Alexander. Applied to Architecture  Relation between a problem, its context and the solution  Format:  Name .- Descriptive name for the pattern  Problem.- Clear description of the problem to be solved  Context.- Situation when the pattern might be applied  Forces .- Items that restrict or influence when to apply the pattern  Solution.- Solution in the context that balances the forces
  • 55. Introduction to Autonomous Mobile Agents 55 Agent Design Patterns  Architectural Patterns, describe agent system architecture  Interaction Patterns, describe how agents communicate with each other  Agent Mobility Patterns, describe how agent roam the network
  • 56. Introduction to Autonomous Mobile Agents 56 Architectural Patterns Name: Layered Agent Pattern Problem: What software architecture best supports the behavior of agents Forces:  Agent system spans several levels of abstraction  Software must include all aspects of agency  Be able to address simple and sophisticated agent behavior Solution: Agents and the system needs are discomposed into six layers Mobility Collaboration Actions Reasoning Beliefs Sensory Figure 13. Layered Agent pattern, [Kendall98]
  • 57. Introduction to Autonomous Mobile Agents 57 Interaction Patterns  Direct Coupling  Point to point, Ack/Req, Agents do not move  Proxy Agent  Communication Session  Badges  Event Dispatcher
  • 58. Introduction to Autonomous Mobile Agents 58 Proxy Agent Pattern [Deugo99] Name: Proxy Agent Pattern Problem: If the Agent sending a message does not expect the receiving Agent to move or Direct Coupling pattern is not applicable for performance reasons, how do mobile agent communicate with others ? Forces:  Mobile Agents change often position  Communication peer-to-peer  Required communication with static Agents Client Agent Proxy Agent Server Agent Figure 14. Proxy Agent pattern Solution: When Agent moves away, agent creates proxy Agent at its home location
  • 59. Introduction to Autonomous Mobile Agents 59 Badges Pattern [Deugo99] Name: Badges Pattern Problem: How can an Agent find a suitable communicating Agent without specifying a concrete Agent? Forces:  Communicating Agents are not known in advance and can change  Design must be flexible and general  After identifying communicating agents communication should be direct Solution: Attach badges to agents. A place provides a service to find a local agent carrying certain badge. Badge C Badge B Badge A Look for Badge B Figure 15. Badges Pattern After finding an available agent communication starts
  • 60. Introduction to Autonomous Mobile Agents 60 Agent Mobility Patterns  By Passer  Commuter  Interface  Isolator  Monitor  Rover
  • 61. Introduction to Autonomous Mobile Agents 61 By Passer Pattern [Hung2002] Agents  Used to avoid unreliable links  Works on behalf of the client  When finished it returns to home  If an Agent does not return the pattern is then called Commuter Serve r AgentClient Figure 16. By Passer Pattern
  • 62. Introduction to Autonomous Mobile Agents 62 Interface Pattern [Hung2002] Agents  Act as intermediary between a client and a server  Execute anywhere  All communication between client and server goes through the Agent  If simple messaging goes through the Agent pattern is called Monitor Server AgentClient Figure 17. Interface Pattern
  • 63. Introduction to Autonomous Mobile Agents 63 Rover Pattern [Hung2002] Agents  Visits several sites in sequence using an itinerary  Streamline recovery model  Helps to reduce network congestion Server AgentClient Server Agent Server Agent Agent Figure 18. Rover Pattern
  • 64. Introduction to Autonomous Mobile Agents 64 Performance of Agent Patterns Stock Server Roving Agent Roving Agent Roving Agent Static Agent Trader Host Roving Trader Success Rate 95% Confidence Interval Host A 50.8% ±1.4% Host B 100.0% ±0.0% Host C 100.0% ±0.0% Host A Host B Host C Figure 19. Trading System [Hung2002] Agents compete to match the best sale order of an specific Stock Symbol
  • 65. Introduction to Autonomous Mobile Agents 65 Case Study  Current Architecture  Pattern Identification  Agent Architecture Self-Organized Multi-Modular Robotic Control Dr. José Negrete-Martínez Facultad de Física e Inteligencia Artificial Universidad Veracruzana, México Figure 20. Modular Robot [Negrete 2002]
  • 66. Introduction to Autonomous Mobile Agents 66 Case Study: Current Architecture Motor(j) B DS Rotating(j) m Payoff(j) IRS AFD AD n Motor(j) B DS Probing(j) Payoff(i)IRS AFD AD SoftwareMechatronic IRS .- Infrared Square Wave DS .- Computer-servo’s interface AFD.- Amplifier-Filter-Detector Circuit AD.- Interface between AFD and Computer DS.- Computer-servo’s Interface m,n .- Memory Register Payoff(k).- function that calculates the sign of the difference of light intensity before and after the module’s motor action Decision(k).-function that adds a signed step to the present position of the Motor(i). The Decision(i) function calls the Payoff(i) function Figure 21. Modular Architecture [Negrete 2002]
  • 67. Introduction to Autonomous Mobile Agents 67 Case Study: Pattern Identification  Layered Agent Pattern, Use of Agent System that supports mobility  Monitor Pattern, Data Acquisition Agent in charge of receiving Infra Red Signal and determining variation on light intensity  Commuter Pattern, Action Agents in charge of executing the ‘Two Arm Bandit’ learning algorithm that inputs the Payoff value and invoking and Orientation Agent  Event Dispatcher Pattern, Action Agent to report step motor movement  Interface Pattern, Motor Driver Agents that interfaces with servo motor interface and a Action Agent
  • 68. Introduction to Autonomous Mobile Agents 68 Desition Agent Case Study: Agent Architecture Motor Driver Agent Action Agent SoftwareMechatronic Orientation Agent DS IRS AFD AD Motor moveMotorEvent executeOtherAction makeDesition determineOrintation haltActioEvent newReading stepMotor Figure 10. Agent Architecture Data Aquisition Agent
  • 69. Introduction to Autonomous Mobile Agents 69 Case Study: Results  Architecture is scalable and distributed  Allows parallel continuous activity  Remains Modular and better separation of concerns  Abstracts hardware Interfaces, more generic  Enables System for Distributed Network or Grid Computing
  • 70. Introduction to Autonomous Mobile Agents 70 Conclusions Agent technology promises big improvements over traditional technologies and positions itself as the future technology for complex software systems. However, as any other technology, it is only good if it profs itself useful and people is willing to spend time with it to solve problems Otherwise it is a nice try

Notes de l'éditeur

  1. These six reasons are discussed at greater length in Section 2 of the paper that I will hand out after the tutorial.
  2. The Sumatra chat server is presented in [RASS97] M. Ranganthan, Anurag Acharya, Shamik Sharma and Joel Saltz. Network-aware Mobile Programs. In Proceedings of the 1997 Usenix Technical Conference , pages 91-104, 1997. and also mentioned in Section 2.2.3 of the paper.
  3. In this block of the seminar It will be defined what is a Software Agent What are the attributes and types of Agents
  4. Speaker Notes: Agent technology can be traced back to 1970 Carl Hewitt proposed a model based on Actors. Actors, are objects self-contained, interactive and concurrently executing Gradually actor based systems became multi-agent systems as known today
  5. Speaker Notes: The term agent has been misused by publishers, scientists and the industry. This obscures the technology real attributes, benefits and issues The community had set a minimum requirements that must be satisfied by any application
  6. Speaker Notes: Considering that each requirement overlaps each other at the same point, the resulting intersecting areas represent all the categories of agents possible Anything outside is not an Agent Experts systems.- Are autonomous, but not cooperate or learn Knowledge systems .- Are passive and not autonomous Distributed Process, such as MPI, Java, JNI can move and cooperate but do not have knowledge and are not autonomous. Objects (C++, Java, Eiffel) are not agents. Agents can be built upon objects
  7. Speaker Notes: Pleides is a distributes collaborative agent architecture with two layers. Layer 1. Task-specific collaborative agents (T-A) work on behalf of the user Layer 2. Information collaborative agents (I-A) that provide information to Layer 1 agents Interface agents get their data from database agents
  8. Speaker Notes: Virtual environments Full body interaction between humans and a virtual world inhabitant agents Stock Trading
  9. Speaker Notes: Can be used in reconfigure mobile computing A niche for this type of application is in wireless applications Network traffic management and QoS.
  10. Speaker Notes: Can be used in reconfigure mobile computing A niche for this type of application is in wireless applications Network traffic management and QoS.
  11. Speaker Notes: Brooks in 1991 defined the famous Sumptom architecture Does not maintain Symbolic models of the real world No planned behavior Reactive agents are viewed as a collection of modules that interoperate autonomously
  12. Speaker Notes: Example uses a mix of reactive agents and collaborative agents BBL, contains a set of patterns of behavior describing the agent reactive skills LPL, is goal oriented CPL, enables agents to plan and cooperate to achieve multi-agent plans This architecture has being used on and autonomous robotic system
  13. Speaker Notes: We should ask about an agent Is the agent behaving appropriately in its social context? It is causing social stress? It is a good citizen Example Julia a TinyMUD built in CMU Julia abilities were maintain conversations with MUD users, keep links to rooms and statistics Julia in a session was perceived by a human female as a boring human centered in Hockey
  14. Speaker Notes: This block of the seminar Discuses what are Autonomous-Mobile Agents, their attributes and how they work
  15. Speaker Notes: Autonomous Agents cooperate,learn and are proactive
  16. Speaker Notes: It is coherent to treat an stock order matching component as a cooperative agent with the capability of finding the best priced order when it beliefs that we want to sell/buy to profit and not otherwise. Entering an order to sell/buy is our way to communicate our desires to the system.
  17. Speaker Notes: It is coherent to treat an stock order matching component as a cooperative agent with the capability of finding the best priced order when it beliefs that we want to sell/buy to profit and not otherwise. Entering an order to sell/buy is our way to communicate our desires to the system.
  18. Speaker Notes:
  19. Speaker Notes: Can be used in reconfigure mobile computing A niche for this type of application is in wireless applications Network traffic management and QoS.
  20. Speaker Notes: Strong Mobility More convenient for the agent programmer Subsumes weak mobility Weak Mobility Sufficient for all but load-balancing applications Well suited to the event-driven style of many agents Much less work for the system developer Supported by standard Java virtual machines
  21. Speaker Notes: This block of the seminar Discuses what are Autonomous-Mobile Agents, their attributes and how they work
  22. This graph shows the base performance of the D’Agents system (migration and messages) relative to a raw TCP/IP connection. A similar graph appears in the paper, but shows the base performance for Tcl , rather than Java, agents.
  23. Speaker Notes: This block of the seminar Discuses what are Autonomous-Mobile Agents, their attributes and how they work
  24. Speaker Notes: Agent Oriented Software Engineering Are a techniques for analyzing, designing and building complex systems Intelligent Software Engineering Describe the need for developing formalism for the design of agent based applications Agent Design Patterns The architectural patterns describe those patterns that have to do with the modeling of enabling agent systems, interaction between agents, and knowledge acquisition among other. Mobile Agent Patterns describe different mobility patterns an agent can follow, some performance results are presented to proof the benefits of using agent mobility.
  25. The system is composed of inter-related sub-systems each of which is in itself a hierarchy
  26. Speaker Notes: After several years researching how to create enabling Agent platforms, now researchers are focusing on new software engineering principles for the creation of Agent application
  27. Speaker Notes: Design patterns are modern object oriented design methodology that was originated in civil engineering. The goal of a design pattern is to represent a relation between a problem its context and a solution. To realize the benefits promised using Agent technology it is necessary to have a repository of well defined design patterns.
  28. Speaker Notes:
  29. Speaker Notes:
  30. Speaker Notes:
  31. Speaker Notes:
  32. Speaker Notes:
  33. Speaker Notes: Items in blue are discussed in detail. The others are particular cases of them or not to relevant
  34. Speaker Notes:
  35. Speaker Notes:
  36. Speaker Notes:
  37. Speaker Notes: The goal of each trader was to buy a certain stock at the same price, before the opponent. One trader is static on Host A and a roving agent starts at A with an itinerary
  38. Speaker Notes: This project was presented at the International Symposium on Robotics and Automation. September 1-4, 2002
  39. Speaker Notes:
  40. Speaker Notes:
  41. Speaker Notes:
  42. Speaker Notes: