:
Yves Demazeau, Frank Dignum, Juan Manuel Corchado Rodríguez, Javier Bajo
:
Advances in Practical Applications of Agents and Multiagent Systems 8th International Conference on Practical Applications of Agents and Multiagent Systems (PAAMS'10)
:
Springer-Verlag
:
9783642123849
:
Advances in Intelligent and Soft Computing
:
1
:
CHF 189.50
:
PAAMS, the International Conference on Practical Applications of Agents and Multi-Agent Systems is an international yearly stage to present, to discuss, and to disseminate the latest advances and the most important outcomes related to real-world applications. It provides a unique opportunity to bring multi-disciplinary experts, academics and practitioners together to exchange their experience in the development of Agents and Multi-Agent Systems. This volume presents the papers that have been accepted for the 2010 edition. These articles capture the most innovative results and this year's advances. Each paper has been reviewed by three different reviewers, from an international com-mittee composed of 82 members from 26 different countries. From the 66 submissions received, 19 were selected for full presentation at the conference, and 14 were accepted as short papers. Moreover, PAAMS'10 incorporated special ses-sions and workshops to complement the regular program, which included 85 ac-cepted papers.
"The Privatisation of Defence and Security: Risks and Opportunities (p. 63-64) Nikolaos TzifakisIntroduction Over the past years, several states and international organisations have increasingly been entrusting private agencies with tasks such as training, restructuring and modernising armies and police forces; gathering and analysing intelligence; securing military communications; operating technologically advanced military systems; providing military transportation and protecting strategic targets; clearing minefields; and interrogating prisoners. Meanwhile, an ever-increasing number of non-governmental organisations, multinational corporations and individuals are turning to private companies for security services. The contractor enterprises are either private military companies that participate in actions such as military operations, stabilisation and post-conflict reconstruction of societies and security sector reform,1 or private security companies specialising in the provision of assets and personal protection services.2 The use of coercive force by private agencies is not a novelty. The phenomenon is as ancient as warfare itself (Shearer, 1998, p. 69). The involvement of mercenaries in armed conflicts has been recorded from the times of ancient Egypt and ancient Greece to our days (Singer, 2001/02, p. 190; Fredland, 2004, p. 206). The Westphalian state as the sole agent of the right to use violence is an exception in history, which in fact existed for a considerable amount of time only in the West.3 The process by which sovereign states expanded and established themselves on a global scale (whose key feature was their monopoly in their territory on the legitimate use of force) was essentially accomplished as late as the twentieth century. However, the transnational and corporate nature of the current private security sector, as opposed to the freelance and unorganised mercenaries of the past, is unprecedented.5 Although the sector of private military and security companies is extremely diverse (encompassing both local, smallsized enterprises and multinational giants listed on international stock exchanges) (Singer 2003; Cilliers, 2002, p. 146), its overall growth since the end of the Cold War is impressive. The turnover of private security companies alone rose in 2007 to $165 billion. G4S, the largest private security company in the world, operates in more than 110 countries and has more than 585,000 employees. In 2008, G4S had an annual turnover of£6 billion. 6 MPRI, a subsidiary of L-3 Communications specialising in the provision of military training services, operates in the United States and 40 countries overseas. MPRI officials have bragged about the fact that their company can muster more (retired) generals than the American army actually has in its service (Leander, 2005a, p. 609). In states as different as the United States, the United Kingdom, Bulgaria and India, the number of private security contractors is much higher than the number of employees in the respective state security agencies (Abrahamsen& Williams, 2009, p. 2). An assessment of the activities of private military and security companies would consider both several actions successfully accomplished and important weaknesses and failures."
Title Page 2 Preface 6 Organization 7 Contents 11 Keynote 11 Multiagent Modelling and Simulation as a Means to Wider Industrial Deployment of Agent Based Computing in Air-Traffic Control 15 Real-Time and Personalisation 11 Real Time Learning of Behaviour Features for Personalised Interest Assessment 18 Introduction 18 Personalized Assessment of User's Interests 19 Towards a Personalized Implicit Feedback 19 Learning User Behaviour Features to Asses Its Centres of Interest 20 Problem Generalisation 21 Real Time Learning of User's Interests 22 System Analysis 22 Agents Identification 23 Identification of Non Cooperative Situations 23 Cooperative Agent Behaviour 23 Experiments and Analysis 24 Checking of Convergence 24 The Pruning of Useless Criteria 25 Convergence Speed 25 Conclusion and Perspectives 26 References 26 A GPU-Based Multi-agent System for Real-Time Simulations 28 Introduction 28 AGPU-Based Action Server for Crowd Simulation 29 Performance Evaluation 33 Application Example 35 Conclusions and Future Work 36 References 37 CLIC: An Agent-Based Interactive and Autonomous Piece of Art 38 Introduction 38 Related Works 39 Theoretical Analysis 39 An Agent-Based Solution 40 VOWELS Methodology 41 AGR Interpretation 41 Software Development: Problems and Solutions 42 Resulting Software and Exhibition 44 Evaluation 45 Conclusions and Perspectives 46 References 47 Collaborative Information Extraction for Adaptive Recommendations in a Multiagent Tourism Recommender System 48 Introduction 48 The Collaborative Information Extraction for Adaptive Recommendations Add-On 49 Information Extraction Agents 49 Information Classification Agents 50 Experiments 52 Conclusions 53 References 53 An Architecture for the Design of Context-Aware Conversational Agents 54 Introduction 54 Our Architecture to Design Context-Awareness Conversational Agents 55 Domain Application 56 Conclusions 59 References 59 Modelling and Computation 12 A Computational Model on Surprise and Its Effects on Agent Behaviour in Simulated Environments 60 Introduction 60 Theory 61 Model 62 Model Overview 62 Event Evaluation 63 Surprise Generation 63 The Sensemaking Process 65 The Effects of the Sensemaking Process 66 Case Stud