A Tool for Editing Agent Organization Models and Their Deployment in MULAN

نویسندگان

  • Endri Deliu
  • Michael Köhler
  • Daniel Moldt
  • Matthias Wester-Ebbinghaus
  • Lawrence Cabac
  • Michael Duvigneau
  • Christine Reese
چکیده

Declaration I declare that this work has been prepared by myself, all literal or content-based quotations are clearly pointed out, and no other sources or aids than those declared have been used. ii Acknowledgements My sincere thanks go to all who contributed to the success of this work: Dr. Michael K ¨ ohler for the exciting topic and the outstanding supervision and support of this work; for their motivational hints and support; A special thank to my brother Orges and my friend Lidia, for their continuous support and their help in proofreading this work.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Monitoring Toolset for Paose

Paose (Petri net-based Agent-Oriented Software Engineering) combines the paradigm of AOSE (Agent-Oriented Software Engineering, see [10]) with the expressive power of Petri nets – reference nets [12] to be more precise. While AOSE is a powerful approach when it comes to designing and developing distributed (agent) applications, it does not address the problems specific to debugging, monitoring,...

متن کامل

Development of a QFD-based expert system for CNC turning centre selection

Computer numerical control (CNC) machine tools are automated devices capable of generating complicated and intricate product shapes in shorter time. Selection of the best CNC machine tool is a critical, complex and time-consuming task due to availability of a wide range of alternatives and conflicting nature of several evaluation criteria. Although, the past researchers had attempted to select ...

متن کامل

ارائه مدلی جهت استفاده ازعاملهای متحرک در سیستم های تشخیص نفوذ توزیع شده مبتنی بر تئوری بازی

The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...

متن کامل

Application of Fuzzy Analytical Hierarchy Process and Quality Function Deployment Techniques for Supplier's Assessment

Abstract Vendor Selection Problem (VSP) has been considered in this paper as an integrated method of Fuzzy Analytic Hierarchy Process (FAHP) and Quality Function Deployment (QFD) in the pharmaceutical company. In QFD method, determining the importance of the "weights" for the customer requirements is an essential and crucial issue. FAHP has been used to determine the importance of the "we...

متن کامل

The new genomic editing system (CRISPR)

Over the past decades, progression in genetic element manipulation, and consequently, the treatment of diseases has been remarkable. It is worth noting that these genetic manipulations perform at different levels, including DNA and RNA. The earlier genomic editing techniques, including MN, ZFN , TALEN , performing their functions by creating double-stranded breaks (DSBs), and after breakage, th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008