Communicative Agent PIM. Specification Specification Service View > Communicative Agent > Agent > OOState > OOState AgentID agentKB kb.

Slides:



Advertisements
Similar presentations
XP Processor Intermediary XP Processor Intermediary XP Processor Application Message (Application Headers+ Application Bodies) XP Layer Entity XP Layer.
Advertisements

Communication-Avoiding Algorithms Jim Demmel EECS & Math Departments UC Berkeley.
CT-KIP Magnus Nyström, RSA Security 23 May Overview A client-server protocol for initialization (and configuration) of cryptographic tokens —Intended.
Use Cases for Fault Tolerance Support in MPI Rich Graham Oak Ridge National Laboratory.
1 UIM with DAML-S Service Description Team Members: Jean-Yves Ouellet Kevin Lam Yun Xu.
Draft-ietf-dime-agent-overload- 01.txt. Agenda Extensions to DOIC Questions Review of representative use cases.
$100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500.
JADE: The Bully Algorithm. Problem Context of distributed computing Problem of leader election: leader election is the process of designating a single.
The YinYang System. Manager Register/Deregister other Managers Register/Deregister Domains Register/Deregister Active Agents Handle an Agent Service.
Local Search for Distributed SAT JIN Xiaolong (Based on [1] )
What kind of sort is represented by the passes shown below? (The definition of a pass is non-standard, so be flexible) Pass
1 Distributed Computing Algorithms CSCI Distributed Computing: everything not centralized many processors.
EXTENSIBLE AGENTS FACILITATE THE EXTENSION OF SNMP AGENTS WITH NEW MIB MODULES SEPARATE SNMP PROTOCOL ENGINE FROM MIB INSTRUMENTATION ALLOW DYNAMIC ADDITION.
Rollerslam PIM Top Level Specification Service View > Rollerslam > SimulationAdmin setState(s:SimulationState)
Simulation Infrastructure PIM. Specification Specification Service View > Simulation Infrastructure > * agent > Agent
Dynamic Matchmaking between Messages and Services in Multi-Agent Systems Muhammed Al-Muhammed Brigham Young University Supported in part by NSF.
SNMP auto LVS balancing Jason Liptak. Overview SNMP overview Network Setup Solution Lessons Learned Future 5/4/2011Jason Liptak 2.
Rollerslam PIM 2.0. Top Level Component Realization Service View > Effector > Sensor > Infrastructure > RollerslamPlayer > Display > GamePhysicsAgent.
S A B D C T = 0 S gets message from above and sends messages to A, C and D S.
TRADING AGENT Developers: Vadim Ratner Dan Baum Supervisor: Ishay Menache.
CS 584. Algorithm Analysis Assumptions n Consider ring, mesh, and hypercube. n Each process can either send or receive a single message at a time. n No.
©Brooks/Cole, 2001 Chapter 11 Strings. ©Brooks/Cole, 2001 Figure 11-1.
Agent Communication Language. Agent Coordination Agents communicate in order to achieve better the goals of themselves or of the society Coordination.
Top Level and Infrastructure Components maurelio & doleron.
Rollerslam PIM (a). Top Level Service Specification View > Rollerslam > SimulationAdmin setState(s:SimulationState)
UNIVERSITY OF JYVÄSKYLÄ Topology Management Algorithms in Chedar InBCT 3.2 Peer-to-Peer communication Cheese Factory -project
Chapter 14 Synchronizers. Synchronizers : Introduction Simulate a synchronous network over an asynchronous underlying network Possible in the absence.
1 © 2013 Cisco Systems, Inc. All rights reserved. Cisco confidential.Cisco Networking Academy, U.S./Canada Equipping Today’s Instructors for Tomorrow’s.
MDA as Approach to Manage Variability in Software Product Families
Requirements Management Services Requirements Management JobScheduler SNMP Support Information for Interested Parties Information for Interested Parties.
Block and Stream Ciphers1 Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Policy, Advocacy and Communication: Issues and challenges Nelson Musoba.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Digital Communications Math class.
1 Robot Networking Greg McChesney Texas Tech University Apr 21, 2009 CS5331: Autonomous Mobile Robots.
Communication and Functional Models
Your Assignment Actor 1Actor 2 Request Status Status Check Status Provider Agent DarkChocolate Agent void HandleMessage(Message msg) { if(msg.action ==
EMP: A Network Management Protocol for IP-Based Wireless Sensor Networks 2010 International Conference on Communication in Wireless Environments and Ubiquitous.
Computer Science: A Structured Programming Approach Using C A Programming Example— Morse Code Morse code, patented by Samuel F. B. Morse in 1837,
Chapter 9 Global Snapshot. Global state  A set of local states that are concurrent with each other Concurrent states: no two states have a happened before.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
DTN Network Management
Mobile Communication MMS. Mobile Communication The MM7 interface enables interactions between Value Added Service applications and an MMSC. The technical.
---- Ping Lang Super Component of Blood Sugar Monitor 1 Term Project Description: Monitoring patients blood sugar, based on different knowledge bases,
Sales Fundamentals Test 1 Review Questions and Points Multiple Choice Multiple Choice 10 Qs = 10 points 10 Qs = 10 points True or False True or False.
A Load Sharing Approach Based on Refactoring of Roles in Multi-Agent Systems Sebnem Bora, A. Murat Tiryaki and Oguz Dikenelli Ege University.
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
Implementing Agent Systems Roughly speaking, there are three platforms: 1.Those that focus on internal agent reasoning and support plans, goals, etc. 2.Those.
D’Agents 1 Presented by Haiying Tan May, 2002 D’Agents: Security in a multiple-language, mobile-agent system Robert S. Gary, David Kotz, George Cybenko,
Computer Communication: An example What happens when I click on
Carroll Wongchote and Jonathan Russo ITEC 452 9/16/2011.
Foundation For Intelligent Physical Agents FIPA Abstract Architecture Specification Presented by Michal Zaremba DERI.
Fusion Design Overview Object Interaction Graph Visibility Graph Class Descriptions Inheritance Graphs Fusion: Design The overall goal of Design is to.
A CROSS PLATFORM REMOTE DESKTOP CONNECTION SUITE A.V.D.S.S.BHADRI RAJU D.RAMESH BABU U.JAYASREE G.NANIBABU.
CST 312 Pablo Breuer.  First published public-key algorithm  A number of commercial products employ this key exchange technique  Purpose is to enable.
Procedure FloydWarshall (highway map G): foreach circle u in G do foreach circle v in G do Cost[u,v]  c(u,v) BestRoute[u,v]=u,v if line from u to v NULL.
1 Thinking Do you have a cell phone? If so, do you prefer to communicate via text or a direct phone call? If not, do you think you would be more.
Jim Schaad Soaring Hawk Security
Standard Algorithms Input validation Finding the minimum
Messages for the International Day for Biological Diversity 2013
Topological Ordering Algorithm: Example
Exercise 2 Main Module Declare Integer dollars String message
Bills Exercise Main Module Declare Integer dollars
Exercise Solution First questions What's output What's input
Designing Algorithms for Multiplication of Fractions
Topological Ordering Algorithm: Example
Topological Ordering Algorithm: Example
Module IV Memory Organization.
Nagios with The Decision Engine Implementing Passive Checks
Topological Ordering Algorithm: Example
Presentation transcript:

Communicative Agent PIM

Specification

Specification Service View > Communicative Agent > Agent > OOState > OOState AgentID agentKB kb

Specification Type View > OOState > WorldObject * > OID > StringOID oid : String > ObjectState > AgentID (from Infra) > Communicative AgentID myID : String

Specification Type View > Message (from Infra) > AskAction oids : OID[*] > TellAction objects : WorldObject[*] > AskAllAction

Realization

Realization Service View > Communicative Agent # processCycle(messages : Message[*]) : Message > Message actions *

Realization Algorithmic View actions = processCycle( agent.getPerceptions()) agent.sendActions(actions) [not actions.isEmpty()]

processCycle(messages : Message[*]) : Message agentKB(sender).worldObject ->includes(m.objects) foreach message m in messages [m.oclIsKindOf(TellAction)] ret.oclIsKindOf(AskAction) and ret.objects = kb.objects-> select(x |m.objects->includes(x.oid)) ret.oclIsKindOf(AskAction) and ret.objects = kb.objects [m.oclIsKindOf(AskAction)] [m.oclIsKindOf(AskAllAction)]