2013
DOI: 10.1016/j.infsof.2012.10.007
|View full text |Cite
|
Sign up to set email alerts
|

Suitability assessment framework of agent-based software architectures

Abstract: Context: A common distributed intelligent system architecture is Multi Agent Systems (MASs). Creating systems with this architecture has been recently supported by Agent Oriented Software Engineering (AOSE) methodologies. But two questions remain: how do we determine the suitability of a MAS implementation for a particular problem? And can this be determined without AOSE expertise? Objective: Given the relatively small number of software engineers that are AOSE experts, many problems that could be better solve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 68 publications
(68 reference statements)
0
3
0
Order By: Relevance
“…The authors of [66] suggest an ECC-based encryption scheme that makes use of homomorphism encryption. The GASONeC method, which used for the encryption pattern, which had been built on it [37] [41]. ECC was formerly applied to swap open and private keys as a result of its capability to provide a high level of security while having a key size of just 176 bits [8] [9].…”
Section: Authentication and Authorization Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors of [66] suggest an ECC-based encryption scheme that makes use of homomorphism encryption. The GASONeC method, which used for the encryption pattern, which had been built on it [37] [41]. ECC was formerly applied to swap open and private keys as a result of its capability to provide a high level of security while having a key size of just 176 bits [8] [9].…”
Section: Authentication and Authorization Methodsmentioning
confidence: 99%
“…ECC was formerly applied to swap open and private keys as a result of its capability to provide a high level of security while having a key size of just 176 bits [8] [9]. The authors of the article [67] provided the design and implementation of a lightweight hub validation protocol, which covers hub enlistment, hub confirmation, and important foundation stages [37] [45]. However, neither a digital signature technique nor any open key cryptography is used in any way [37].…”
Section: Authentication and Authorization Methodsmentioning
confidence: 99%
“… Distributed Agent based architecture  Socialistic architecture  Master-slave architecture Distributed agent based software architectures have been presented in [6] and was successfully exploited for various distributed and parallel computing applications [7][8] and [9]. Further studies were carried out on this architecture in [10] and [11].…”
Section: B Proposed Architecturementioning
confidence: 99%
“…For creating Multi Agent System (MAS) Agent Oriented Software Engineering (AOSE) is supported [11]. But there arises two questions that is the first is how do we determine the suitability of MAS implementation of a particular problem and the next is how this can be done without an AOSE expert?…”
Section: Suitability Assessment Framework [11]mentioning
confidence: 99%
“…The software agent methodologies are PROMETHEUS, GAIA, OperA, O-MaSE, Tropos and GORMAS [11] [7]. GAIA is a methodology for agent-oriented analysis and design.…”
Section: Introductionmentioning
confidence: 99%