Filters
total: 9
Search results for: MULTIAGENT SYSTEM
-
Practical Applications of Agents and Multiagent Systems
Conferences -
International Joint Conference on Autonomous Agents and Multiagent Systems
Conferences -
International KES Conference on Agents and Multiagent systems - Technologies and Applications (International KES Symposium on Agents and Multiagent systems - Technologies and Applications)
Conferences -
International Conference on Computational Collective Intelligence (International Conference on Computational Collective Intelligence: Semantic Web, Social Networks and Multiagent Systems)
Conferences -
Learning Feedforward Control Using Multiagent Control Approach for Motion Control Systems
Publication -
Algorithms and Tools for Intelligent Control of Critical Infrastructure Systems
PublicationCritical Infrastructure Systems (CIS) are spatially distributed and of a network structure. The dynamics are nonlinear, uncertain and with several time scales. There is a variety of different objectives to be reliably met under a wide range of operational conditions. The operational conditions are influenced by the disturbance inputs, operating ranges of the CIS, faults in the sensors and actuators and abnormalities occurring in...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublicationModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublicationSustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...
-
Trust Dynamics Analysis of CTR Scheme Subversion under Virtual Anonymity and Trust-Unaware Partner Selection
PublicationWe propose a framework to study Markovian trust value dynamics in a centralized Computational Trust and Reputation (CTR) scheme under trust-unaware partner selection using a mean-value approximation. Analytically founded answers are sought to questions like: Can dishonest agents subvert the CTR scheme (i.e., acquire higher trust values than honest agents)? Is indirect reciprocity incentivized? Is there a qualitative impact of a...