• Deutsch
Login

Open Access

  • Home
  • Search
  • Browse
  • Publish/report a document
  • Help

Refine

Has Fulltext

  • no (40)
  • yes (12)

Author

  • Müller-Schloer, Christian (51)
  • Hähner, Jörg (42)
  • Tomforde, Sven (35)
  • Kantert, Jan (23)
  • Edenhofer, Sarah (19)
  • Klejnowski, Lukas (9)
  • Bernard, Yvonne (7)
  • Prothmann, Holger (6)
  • Reif, Wolfgang (6)
  • Schmeck, Hartmut (6)
+ more

Year of publication

  • 2018 (1)
  • 2017 (2)
  • 2016 (9)
  • 2015 (7)
  • 2014 (7)
  • 2013 (2)
  • 2012 (2)
  • 2011 (5)
  • 2010 (6)
  • 2009 (3)
+ more

Document Type

  • Part of a Book (28)
  • Conference Proceeding (12)
  • Article (11)
  • Report (1)

Language

  • English (52)

Keywords

  • Computer Science Applications (1)
  • Information Systems (1)

Institute

  • Fakultät für Angewandte Informatik (52)
  • Institut für Informatik (52)
  • Lehrstuhl für Organic Computing (48)
  • Institut für Software & Systems Engineering (6)
  • Lehrstuhl für Softwaretechnik (6)
  • Lehrstuhl für Menschzentrierte Künstliche Intelligenz (3)
  • Lehrstuhl für Systemnahe Informatik und Kommunikationssysteme (3)
  • Nachhaltigkeitsziele (1)
  • Ziel 11 - Nachhaltige Städte und Gemeinden (1)

52 search hits

  • 1 to 20
  • 10
  • 20
  • 50
  • 100

Sort by

  • Year
  • Year
  • Title
  • Title
  • Author
  • Author
Reference architectures for trustworthy energy management, desktop grid computing applications, and ubiquitous display environments (2013)
Anders, Gerrit ; Steghöfer, Jan-Philipp ; Klejnowski, Lukas ; Wißner, Michael ; Hammer, Stephan ; Siefert, Florian ; Seebach, Hella ; Bernard, Yvonne ; Reif, Wolfgang ; André, Elisabeth ; Müller-Schloer, Christian
This report presents three reference architectures that can be used as architectural blueprints for applications of three different system classes. The first system class comprises applications in the field of energy management; the second one contains applications in the domain of desktop grid computing; the third system class contains multi-user multi-display applications. Because applications in the scope of energy management are safety-critical and desktop grid computing applications have to cope with a variety of self-interested participants, applications of these domains have in common that they can increase their robustness and efficiency by considering the trustworthiness of participants. Multi-user multi-display applications have to assess the social relationships between its users and adapt based on trustworthiness facets such as transparency and controllability. Therefore, the reference architectures given here are based on a multi-agent system that provides functionality for the utilization of trust. Experiences with participants can be stored and evaluated so that trust can be derived and incorporated into the applications. Additionally, the platform provides the basis for open systems in which agents enter and leave dynamically.
Defending autonomous agents against attacks in multi-agent systems using norms (2015)
Kantert, Jan ; Edenhofer, Sarah ; Tomforde, Sven ; Hähner, Jörg ; Müller-Schloer, Christian
The Trusted Desktop Grid (TDG) is a self-organised, agent-based organisation, where agents perform computational tasks for others to increase their performance. In order to establish a fair distribution and provide counter-measures against egoistic or malicious elements, technical trust is used. A fully self-organised approach can run into disturbed states such as a trust breakdown of the system that lead to unsatisfying system performance although the majority of participants is still behaving well. We previously introduced an additional system-wide control loop to detect and alleviate disturbed situations. Therefore, we describe an Observer/Controller loop at system level that monitors the system status and intervenes if necessary. This paper focuses on the controller part which instantiates norms as reaction to observed suspicious situations. We demonstrate the benefit of our approach within a Repast-based simulation of the TDG. Therein, the impact of disturbances on the system performance is decreased significantly and the time to recover is shortened.
A Graph Analysis Approach to Detect Attacks in Multi-agent Systems at Runtime (2014)
Kantert, Jan ; Scharf, Hannes ; Edenhofer, Sarah ; Tomforde, Sven ; Hähner, Jörg ; Müller-Schloer, Christian
Advanced Attacks to Trusted Communities in Multi-agent Systems (2014)
Edenhofer, Sarah ; Kantert, Jan ; Klejnowski, Lukas ; Tomforde, Sven ; Hähner, Jörg ; Müller-Schloer, Christian
Robust Self-Monitoring in Trusted Desktop Grids for Self-Configuration at Runtime (2014)
Kantert, Jan ; Edenhofer, Sarah ; Tomforde, Sven ; Hähner, Jörg ; Müller-Schloer, Christian
Implementing an adaptive higher level observer in trusted desktop grid to control norms (2014)
Kantert, Jan ; Scharf, Hannes ; Edenhofer, Sarah ; Tomforde, Sven ; Hähner, Jörg ; Müller-Schloer, Christian
Grid Computing Systems are examples for open systems with heterogeneous and potentially malicious entities. Such systems can be controlled by system-wide intelligent control mechanisms working on trust relationships between these entities. Trust relationships are based on ratings among individual entities and represent system-wide information. In this paper, we propose to utilise a normative approach for the system-level control loop working on basis of these trust values. Thereby, a normative approach does not interfere with the entities’ autonomy and handles each system as black box. Implicit rules already existing in the system are turned into explicit norms – which in turn are becoming mandatory for all entities. This allows the distributed systems to derive the desired behaviour and cooperate in reaction to disturbed situations such as attacks.
Detecting and isolating inconsistently behaving agents using an intelligent control loop (2015)
Kantert, Jan ; Edenhofer, Sarah ; Tomforde, Sven ; Hähner, Jörg ; Müller-Schloer, Christian
Desktop Computing Grids provide a framework for joining in and sharing resources with others. The result is a self-organised system that typically consists of numerous distributed autonomous entities. Openness and heterogeneity postulate severe challenges to the overall system’s stability and efficiency since uncooperative and even malicious participants are free to join. In this paper, we present a concept for identifying agents with exploitation strategies that works on a system-wide analysis of trust and work relationships. Afterwards, we introduce a system-wide control loop to isolate these malicious elements using a norm-based approach – due to the agents’ autonomy, we have to build on indirect control actions. Within simulations of a Desktop Computing Grid scenario, we show that the intelligent control loop works highly successful: these malicious elements are identified and isolated with a low error rate. We further demonstrate that the approach results in a significant increa se of utility for all participating benevolent agents.
Distributed Rendering in an Open Self-Organised Trusted Desktop Grid (2015)
Kantert, Jan ; Spiegelberg, Henning ; Tomforde, Sven ; Hähner, Jörg ; Müller-Schloer, Christian
An Accusation-Based Strategy to Handle Undesirable Behaviour in Multi-agent Systems (2015)
Edenhofer, Sarah ; Stifter, Christopher ; Janen, Uwe ; Kantert, Jan ; Tomforde, Sven ; Hähner, Jörg ; Müller-Schloer, Christian
Improving Reliability and Endurance Using End-to-End Trust in Distributed Low-Power Sensor Networks (2015)
Kantert, Jan ; Wildemann, Sergej ; von Zengen, Georg ; Edenhofer, Sarah ; Tomforde, Sven ; Wolf, Lars ; Hähner, Jörg ; Müller-Schloer, Christian
Comparison of surveillance strategies to identify undesirable behaviour in multi-agent systems (2016)
Edenhofer, Sarah ; Stifter, Christopher ; Tomforde, Sven ; Kantert, Jan ; Müller-Schloer, Christian ; Hähner, Jörg
Adaptive Control of Sensor Networks (2010)
Tomforde, Sven ; Zgeras, Ioannis ; Hähner, Jörg ; Müller-Schloer, Christian
Possibilities and limitations of decentralised traffic control systems (2010)
Tomforde, Sven ; Prothmann, Holger ; Branke, Jurgen ; Hähner, Jörg ; Müller-Schloer, Christian ; Schmeck, Hartmut
PhD forum: Competing agents for distributed object-tracking in smart camera networks (2009)
Janen, Uwe ; Hähner, Jörg ; Müller-Schloer, Christian
Marketplace-Oriented Behavior in Semantic Multi-Criteria Decision Making Autonomous Systems (2009)
Mahmoudi, Ghadi ; Müller-Schloer, Christian ; Hähner, Jörg
Self-Organised Routing for Road Networks (2012)
Prothmann, Holger ; Tomforde, Sven ; Lyda, Johannes ; Branke, Jürgen ; Hähner, Jörg ; Müller-Schloer, Christian ; Schmeck, Hartmut
Restricted on-line learning in real-world systems (2011)
Tomforde, Sven ; Brameshuber, Andreas ; Hähner, Jörg ; Müller-Schloer, Christian
An Architecture for Trust-Adaptive Agents (2010)
Klejnowski, Lukas ; Bernard, Yvonne ; Hähner, Jörg ; Müller-Schloer, Christian
Formal Specification and Analysis of Trusted Communities (2010)
Steghöfer, Jan-Philipp ; Nafz, Florian ; Reif, Wolfgang ; Bernard, Yvonne ; Klejnowski, Lukas ; Hähner, Jörg ; Müller-Schloer, Christian
Trustworthy organic computing systems: challenges and perspectives (2010)
Steghöfer, Jan-Philipp ; Kiefhaber, Rolf ; Leichtenstern, Karin ; Bernard, Yvonne ; Klejnowski, Lukas ; Reif, Wolfgang ; Ungerer, Theo ; André, Elisabeth ; Hähner, Jörg ; Müller-Schloer, Christian
  • 1 to 20

OPUS4 Logo

  • Contact
  • Imprint
  • Sitelinks