|
|
|
|
LEADER |
05235nam a22006495i 4500 |
001 |
978-3-642-04879-1 |
003 |
DE-He213 |
005 |
20170119163458.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642048791
|9 978-3-642-04879-1
|
024 |
7 |
|
|a 10.1007/978-3-642-04879-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a Q334-342
|
050 |
|
4 |
|a TJ210.2-211.495
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a TJFM1
|2 bicssc
|
072 |
|
7 |
|a COM004000
|2 bisacsh
|
082 |
0 |
4 |
|a 006.3
|2 23
|
245 |
1 |
0 |
|a Safety and Security in Multiagent Systems
|h [electronic resource] :
|b Research Results from 2004-2006 /
|c edited by Mike Barley, Haralambos Mouratidis, Amy Unruh, Diana Spears, Paul Scerri, Fabio Massacci.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2009.
|
300 |
|
|
|a VIII, 343 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 4324
|
505 |
0 |
|
|a Methodological Approaches to High-Assurance Systems -- Towards Safe Coordination in Multi-agent Systems -- Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems -- Dependable Multi-agent Systems: Layered Reference Architecture and Representative Mechanisms -- Towards Using Simulation to Evaluate Safety Policy for Systems of Systems -- A Guardian Agent Approach to Safety in Medical Multi-agent Systems -- A Distributed Numerical Approach for Managing Uncertainty in Large-Scale Multi-agent Systems -- Prevention and Response to Harm/Failures -- The First Law of Robotics -- Safe Stochastic Planning: Planning to Avoid Fatal States -- Building Coordinated Real-Time Control Plans -- A Framework for Goal-Based Semantic Compensation in Agent Systems -- Safe Agents in Space: Preventing and Responding to Anomalies in the Autonomous Sciencecraft Experiment -- Stochastic Approaches to Predictability and Unpredictability -- Uncertain Agent Verification through Probabilistic Model-Checking -- Safety and Security Multi-agent Systems -- Coordinating Randomized Policies for Increasing Security in Multiagent Systems -- Safety and Security in Human-Computer Interactions -- Safety in the Context of Coordination via Adjustable Autonomy -- Command and Authorization Services for Multiple Humans Interacting with a Software Control Agent for Advanced Life Support -- Analyzing Dangers in Multiagent Rescue Using DEFACTO -- Using Multi-agent Systems to Specify Safe and Secure Services for Virtual Organisations -- MLBPR: MAS for Large-Scale Biometric Pattern Recognition -- Self-Protection -- Intentional Agents in Defense -- Security and Privacy Issues in Agent-Based Location-Aware Mobile Commerce -- Biologically-Inspired Concepts for Autonomic Self-protection in Multiagent Systems -- Erratum to: Fluid-Like Swarms with Predictable Macroscopic Behavior.
|
520 |
|
|
|a The Safety and Security in Multiagent Systems (SASEMAS) series of workshops that took place from 2004-2006 provided a forum for the exchange of ideas and discussion on areas related to the safety and security of multiagent systems. In particular, the workshops explored issues related to the development and deployment of safe and secure agents and multiagents systems with topics ranging from definitions of safety and security for single agents or entire systems to verification/validation of agent and multiagent systems to design, mechanisms and deployment to user requirements, agent behavior, and trust. This book contains 22 papers grouped into five main sections according to the following topics: methodological approaches to high-assurance systems, prevention and response to harm/failures, stochastic approaches to predictability and unpredictability, safety and security in human-computer interactions, and self-protection.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a User interfaces (Computer systems).
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
650 |
2 |
4 |
|a User Interfaces and Human Computer Interaction.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
|
|a Barley, Mike.
|e editor.
|
700 |
1 |
|
|a Mouratidis, Haralambos.
|e editor.
|
700 |
1 |
|
|a Unruh, Amy.
|e editor.
|
700 |
1 |
|
|a Spears, Diana.
|e editor.
|
700 |
1 |
|
|a Scerri, Paul.
|e editor.
|
700 |
1 |
|
|a Massacci, Fabio.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642048784
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 4324
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-04879-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|