Works Published in 2006

search works

Displaying works 41 - 60 of 181 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2006 journal article

Problems and Techniques

SIAM Review, 48(4), 679–680.

By: I. Ipsen*

Source: ORCID
Added: January 17, 2020

2006 conference paper

Computer Optimized Gun Design

2006 Joint 31st International Conference on Infrared Millimeter Waves and 14th International Conference on Teraherz Electronics. Presented at the >2006 Joint 31st International Conference on Infrared Millimeter Waves and 14th International Conference on Teraherz Electronics.

By: R. Ives*, M. Read*, T. Bui*, J. David* & H. Tran*

Event: >2006 Joint 31st International Conference on Infrared Millimeter Waves and 14th International Conference on Teraherz Electronics

TL;DR: This presentation described computer optimization in the 3D trajectory code beam optics analysis (BOA) because meshing in BOA is completely automatic, allowing the program to be controlled by the optimization routines. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: January 5, 2020

2006 journal article

Stochastic portfolio optimization with log utility

International Journal of Theoretical and Applied Finance, 9(6), 869–887.

By: T. Pang n

author keywords: Portfolio optimization; dynamic programming equations; subsolution and supersolutions
UN Sustainable Development Goal Categories
Source: Crossref
Added: December 16, 2019

2006 conference paper

Comparison between failure detection test signals for continuous systems and sampled-data systems

Proceedings of the 45th IEEE Conference on Decision and Control. Presented at the Proceedings of the 45th IEEE Conference on Decision and Control.

By: D. Choe n, S. Campbell n & R. Nikoukhah*

Event: Proceedings of the 45th IEEE Conference on Decision and Control

TL;DR: This paper combines the key ideas of the two previous algorithms and presents an algorithm that finds optimal piecewise-constant signals for continuous systems and would appear to be greatly faster than the original CS algorithm. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: December 16, 2019

2006 conference paper

Model Based Failure Detection using Test Signals from Linearizations: A Case Study

2006 IEEE Conference on Computer-Aided Control Systems Design. Presented at the 2006 IEEE Conference on Computer-Aided Control Systems Design.

By: S. Campbell*, K. Drake, I. Andjelkovic, K. Sweetingham & D. Choe

Event: 2006 IEEE Conference on Computer-Aided Control Systems Design

Sources: Crossref, NC State University Libraries
Added: December 16, 2019

2006 conference paper

Robust detection of incipient faults: an active approach

2006 14th Mediterranean Conference on Control and Automation. Presented at the 2006 14th Mediterranean Conference on Control and Automation.

By: R. Nikoukhah* & S. Campbell n

Event: 2006 14th Mediterranean Conference on Control and Automation

Sources: Crossref, NC State University Libraries
Added: December 16, 2019

2006 conference paper

Trust representation and aggregation in a distributed agent system

Proceedings of the National Conference on Artificial Intelligence, 2, 1425–1430. http://www.scopus.com/inward/record.url?eid=2-s2.0-33750688177&partnerID=MN8TOARS

By: Y. Wang & M. Singh

Contributors: Y. Wang & M. Singh

Source: ORCID
Added: December 10, 2019

2006 conference paper

Specifying and resolving preferences among agent interaction patterns

Proceedings of the International Conference on Autonomous Agents, 2006, 1361–1368.

By: A. Mallya & M. Singh n

Contributors: A. Mallya & M. Singh n

TL;DR: Algorithms for choosing the best execution path by considering the interplay between the preference specification of a protocol and local policies of agents interacting using the protocol are developed, thereby giving the specifications a natural operational characterization. (via Semantic Scholar)
Source: ORCID
Added: December 10, 2019

2006 journal article

Secure data management in reactive sensor networks

Lecture Notes in Computer Science.

Contributors: M. Gore*, M. Singh*, L. Chaithanya & M. Singh

TL;DR: This paper proposes a security solution that makes cluster based sensor networks resilient to report fabrication attacks and relies on symmetric key mechanisms, appropriate for random deployment and also handles the node failures. (via Semantic Scholar)
Source: ORCID
Added: December 10, 2019

2006 chapter

Producing Compliant Interactions: Conformance, Coverage, and Interoperability

In Declarative Agent Languages and Technologies IV (pp. 1–15).

Contributors: A. Chopra n & M. Singh n

TL;DR: A number of examples are presented to comprehensively illustrate the orthogonality of conformance, coverage, and interoperability and show that the three are orthogonal to each other. (via Semantic Scholar)
Sources: ORCID, Crossref, NC State University Libraries
Added: December 10, 2019

2006 book

Service-Oriented Computing: Semantics, Processes, Agents

In Service-Oriented Computing: Semantics, Processes, Agents (pp. 1–549).

By: M. Singh n & M. Huhns*

Contributors: M. Singh n & M. Huhns*

TL;DR: This paper presents a meta-answering of the principles of Service-Oriented Computing with a focus on how to model and manage engagement in the context of web services. (via Semantic Scholar)
Sources: ORCID, NC State University Libraries
Added: December 10, 2019

2006 journal article

Report on the fourth international joint conference on Autonomous Agents and Multiagent Systems (AAMAS 2005)

AI Magazine, 27(1), 103–107. http://www.scopus.com/inward/record.url?eid=2-s2.0-33645745843&partnerID=MN8TOARS

By: S. Koenig, S. Kraus, M. Singh & M. Wooldridge

Contributors: S. Koenig, S. Kraus, M. Singh & M. Wooldridge

Source: ORCID
Added: December 10, 2019

2006 chapter

OWL-P: A Methodology for Business Process Development

In M. Kolp, P. Bresciani, B. Henderson-Sellers, & M. Winikoff (Eds.), Agent-Oriented Information Systems III. AOIS 2005: Vol. 3529 LNAI (pp. 79–94).

By: N. Desai n, A. Mallya, A. Chopra n & M. Singh n

Contributors: N. Desai n, A. Mallya, A. Chopra n & M. Singh n

Ed(s): M. Kolp, P. Bresciani, B. Henderson-Sellers & M. Winikoff

TL;DR: This work proposes an agent-based approach for business process modelling and enactment which is centred around the concepts of commitment-based agent interaction protocols and policies and shows how this reusable, refinable and evolvable abstraction simplifies business process design and development. (via Semantic Scholar)
Sources: ORCID, Crossref, NC State University Libraries
Added: December 10, 2019

2006 chapter

Introducing Preferences into Commitment Protocols

In F. P. M. Dignum, R. M. van Eijk, & R. Flores (Eds.), Agent Communication II (pp. 136–149).

By: A. Mallya n & M. Singh n

Contributors: A. Mallya n & M. Singh n

Ed(s): F. Dignum, R. van Eijk & R. Flores

TL;DR: This paper develops an approach for specifying preferences among executions that are allowed by a protocol and shows how to incorporate the specifications into rulesets, thereby giving the specifications a natural operational characterization. (via Semantic Scholar)
Sources: ORCID, Crossref, NC State University Libraries
Added: December 10, 2019

2006 conference paper

Multiagent policy architecture for virtual business organizations

Proceedings - 2006 IEEE International Conference on Services Computing, SCC 2006, 44–51.

By: Y. Udupi n & M. Singh

Contributors: Y. Udupi n & M. Singh

TL;DR: This work proposes a proactive multiagent policy-based architecture, a hierarchical model of policy monitoring, compliance checking, and enforcement for VOs, and a formalization of VOs that are best understood as multiagent systems. (via Semantic Scholar)
Source: ORCID
Added: December 10, 2019

2006 book

Introducing preferences into commitment protocols

In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 136–149). http://www.scopus.com/inward/record.url?eid=2-s2.0-77956013565&partnerID=MN8TOARS

By: A. Mallya & M. Singh

Contributors: A. Mallya & M. Singh

Source: ORCID
Added: December 10, 2019

2006 journal article

Interaction-oriented programming: Concepts, theories, and results on commitment protocols

Lecture Notes in Computer Science.

Contributors: M. Singh n

TL;DR: The theory of protocols supports flexible enactment of protocols, a treatment of refinement and composition of protocols and their relationship with organizations and contracts, thus reducing the gap between agents and conventional computer science. (via Semantic Scholar)
Source: ORCID
Added: December 10, 2019

2006 conference paper

Contract enactment in virtual organizations: A commitment-based approach

Proceedings of the National Conference on Artificial Intelligence, 1, 722–727. http://www.scopus.com/inward/record.url?eid=2-s2.0-33750708550&partnerID=MN8TOARS

By: Y. Udupi & M. Singh

Contributors: Y. Udupi & M. Singh

Source: ORCID
Added: December 10, 2019

2006 conference paper

An overview of business process adaptations via protocols

Proceedings of the International Conference on Autonomous Agents, 2006, 1326–1328.

By: N. Desai n, A. Chopra n & M. Singh n

Contributors: N. Desai n, A. Chopra n & M. Singh n

TL;DR: Through a real business scenario of auto-insurance claim processing, this paper demonstrates how a wide range of adaptations can be handled naturally and systematically via protocol composition. (via Semantic Scholar)
Source: ORCID
Added: December 10, 2019

2006 conference paper

Contextualizing commitment protocols

Proceedings of the International Conference on Autonomous Agents, 2006, 1345–1352.

Contributors: A. Chopra n & M. Singh n

TL;DR: This work contextualizes a protocol by adapting it via different transformations by relating the original and transformed protocols; and contextualization is related to protocol compliance. (via Semantic Scholar)
Source: ORCID
Added: December 10, 2019

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.