Agents and Peer-to-Peer Computing
暂无分享,去创建一个
Maryam Purvis | Martin K. Purvis | Maryam A. Purvis | Sharmila Savarimuthu | M. Purvis | S. Savarimuthu
[1] Peter Druschel,et al. Storage management and caching in PAST , 2001 .
[2] Petter Ögren,et al. Flocking with Obstacle Avoidance: A New Distributed Coordination Algorithm Based on Voronoi Partitions , 2005, Proceedings of the 2005 IEEE International Conference on Robotics and Automation.
[3] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[4] Lei Yu,et al. A Conceptual Framework for Agent Oriented and Role Based Workflow Modelling , 1999 .
[5] L. N. Foner,et al. A multi-agent, referral based matchmaking system , 1997 .
[6] Sandip Sen,et al. The Success and Failure of Tag-Mediated Evolution of Cooperation , 2005, LAMAS.
[7] Dimitrios Tsoumakos,et al. Adaptive probabilistic search for peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[8] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[9] Naoyasu Ubayashi,et al. RoleEP: role based evolutionary programming for cooperative mobile agent applications , 2000, Proceedings International Symposium on Principles of Software Evolution.
[10] R. Riolo,et al. Evolution of cooperation without reciprocity , 2001, Nature.
[11] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[12] Liam Wagner,et al. Byzantine Agreements in Secure Communication , 2003, ArXiv.
[13] Andrzej Duda,et al. Discover: A Resource Discovery System Based on Content Routing , 1995, Comput. Networks ISDN Syst..
[14] Yves Deswarte,et al. Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[16] Brian Randell,et al. Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach , 1994, EDCC.
[17] Amit P. Sheth,et al. Discovery of Web services in a federated registry environment , 2004 .
[18] Franco Zambonelli,et al. Developing multiagent systems: The Gaia methodology , 2003, TSEM.
[19] Ernst Fehr,et al. Detrimental effects of sanctions on human altruism , 2003, Nature.
[20] Pierre Chevaillier,et al. oRis : un environnement de simulation interactive multi-agents , 2002, Tech. Sci. Informatiques.
[21] Patrice Perny,et al. Search for Compromise Solutions in Multiobjective State Space Graphs , 2006, ECAI.
[22] Franco Zambonelli,et al. Organisational Rules as an Abstraction for the Analysis and Design of Multi-Agent Systems , 2001, Int. J. Softw. Eng. Knowl. Eng..
[23] Munindar P. Singh,et al. Emergent properties of referral systems , 2003, AAMAS '03.
[24] Maryam Purvis,et al. Mechanisms for Cooperative Behaviour in Agent Institutions , 2006, 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology.
[25] Kevin Leyton-Brown,et al. Incentives for sharing in peer-to-peer networks , 2001, EC '01.
[26] Ralph L. Keeney,et al. Decisions with multiple objectives: preferences and value tradeoffs , 1976 .
[27] Vincenzo Gervasi,et al. Coordination without communication: the case of the flocking problem , 2004, Discret. Appl. Math..
[28] Hector Garcia-Molina,et al. Efficient search in peer to peer networks , 2004 .
[29] Bruce Edmonds,et al. Evolving social rationality for MAS using "tags" , 2002, AAMAS '03.
[30] Antony I. T. Rowstron,et al. PAST: a large-scale, persistent peer-to-peer storage utility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[31] Munindar P. Singh,et al. Community-based service location , 2001, CACM.
[32] Amit P. Sheth,et al. METEOR-S WSDI: A Scalable P2P Infrastructure of Registries for Semantic Publication and Discovery of Web Services , 2005, Inf. Technol. Manag..
[33] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[34] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[35] Craig W. Reynolds. Flocks, herds, and schools: a distributed behavioral model , 1998 .
[36] Hein Meling,et al. Anthill: a framework for the development of agent-based peer-to-peer systems , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[37] Munindar P. Singh,et al. Searching social networks , 2003, AAMAS '03.
[38] Ben Y. Zhao,et al. Pond: The OceanStore Prototype , 2003, FAST.
[39] Sandip Sen,et al. Reciprocity: a foundational principle for promoting cooperative behavior among self-interested agents , 1996 .
[40] M. Nowak,et al. Evolution of indirect reciprocity by image scoring , 1998, Nature.
[41] Marek Karpinski,et al. An XOR-based erasure-resilient coding scheme , 1995 .
[42] Munindar P. Singh,et al. Incentive Mechanisms for Peer-to-Peer Systems , 2003, AP2PC.
[43] Adi Shamir,et al. How to share a secret , 1979, CACM.