: Yves Demazeau, Frank Dignum, Juan Manuel Corchado Rodríguez, Javier Bajo
: Advances in Practical Applications of Agents and Multiagent Systems 8th International Conference on Practical Applications of Agents and Multiagent Systems (PAAMS'10)
: Springer-Verlag
: 9783642123849
: Advances in Intelligent and Soft Computing
: 1
: CHF 189.50
:
: Allgemeines, Lexika
: English
: 300
: Wasserzeichen/DRM
: PC/MAC/eReader/Tablet
: PDF
PAAMS, the International Conference on Practical Applications of Agents and Multi-Agent Systems is an international yearly stage to present, to discuss, and to disseminate the latest advances and the most important outcomes related to real-world applications. It provides a unique opportunity to bring multi-disciplinary experts, academics and practitioners together to exchange their experience in the development of Agents and Multi-Agent Systems. This volume presents the papers that have been accepted for the 2010 edition. These articles capture the most innovative results and this year's advances. Each paper has been reviewed by three different reviewers, from an international com-mittee composed of 82 members from 26 different countries. From the 66 submissions received, 19 were selected for full presentation at the conference, and 14 were accepted as short papers. Moreover, PAAMS'10 incorporated special ses-sions and workshops to complement the regular program, which included 85 ac-cepted papers.
"The Privatisation of Defence and Security: Risks and Opportunities(p. 63-64)

Nikolaos Tzifakis

Introduction

Over the past years, several states and international organisations have increasingly been entrusting private agencies with tasks such as training, restructuring and modernising armies and police forces; gathering and analysing intelligence; securing military communications; operating technologically advanced military systems; providing military transportation and protecting strategic targets; clearing minefields; and interrogating prisoners. Meanwhile, an ever-increasing number of non-governmental organisations, multinational corporations and individuals are turning to private companies for security services.

The contractor enterprises are either private military companies that participate in actions such as military operations, stabilisation and post-conflict reconstruction of societies and security sector reform,1 or private security companies specialising in the provision of assets and personal protection services.2 The use of coercive force by private agencies is not a novelty. The phenomenon is as ancient as warfare itself (Shearer, 1998, p. 69).

The involvement of mercenaries in armed conflicts has been recorded from the times of ancient Egypt and ancient Greece to our days (Singer, 2001/02, p. 190; Fredland, 2004, p. 206). The Westphalian state as the sole agent of the right to use violence is an exception in history, which in fact existed for a considerable amount of time only in the West.3 The process by which sovereign states expanded and established themselves on a global scale (whose key feature was their monopoly in their territory on the legitimate use of force) was essentially accomplished as late as the twentieth century.

However, the transnational and corporate nature of the current private security sector, as opposed to the freelance and unorganised mercenaries of the past, is unprecedented.5 Although the sector of private military and security companies is extremely diverse (encompassing both local, smallsized enterprises and multinational giants listed on international stock exchanges) (Singer 2003; Cilliers, 2002, p. 146), its overall growth since the end of the Cold War is impressive.

The turnover of private security companies alone rose in 2007 to $165 billion. G4S, the largest private security company in the world, operates in more than 110 countries and has more than 585,000 employees. In 2008, G4S had an annual turnover of£6 billion. 6 MPRI, a subsidiary of L-3 Communications specialising in the provision of military training services, operates in the United States and 40 countries overseas.

MPRI officials have bragged about the fact that their company can muster more (retired) generals than the American army actually has in its service (Leander, 2005a, p. 609). In states as different as the United States, the United Kingdom, Bulgaria and India, the number of private security contractors is much higher than the number of employees in the respective state security agencies (Abrahamsen& Williams, 2009, p. 2). An assessment of the activities of private military and security companies would consider both several actions successfully accomplished and important weaknesses and failures."
Title Page2
Preface6
Organization7
Contents11
Keynote11
Multiagent Modelling and Simulation as a Means to Wider Industrial Deployment of Agent Based Computing in Air-Traffic Control15
Real-Time and Personalisation11
Real Time Learning of Behaviour Features for Personalised Interest Assessment18
Introduction18
Personalized Assessment of User's Interests19
Towards a Personalized Implicit Feedback19
Learning User Behaviour Features to Asses Its Centres of Interest20
Problem Generalisation21
Real Time Learning of User's Interests22
System Analysis22
Agents Identification23
Identification of Non Cooperative Situations23
Cooperative Agent Behaviour23
Experiments and Analysis24
Checking of Convergence24
The Pruning of Useless Criteria25
Convergence Speed25
Conclusion and Perspectives26
References26
A GPU-Based Multi-agent System for Real-Time Simulations28
Introduction28
AGPU-Based Action Server for Crowd Simulation29
Performance Evaluation33
Application Example35
Conclusions and Future Work36
References37
CLIC: An Agent-Based Interactive and Autonomous Piece of Art38
Introduction38
Related Works39
Theoretical Analysis39
An Agent-Based Solution40
VOWELS Methodology41
AGR Interpretation41
Software Development: Problems and Solutions42
Resulting Software and Exhibition44
Evaluation45
Conclusions and Perspectives46
References47
Collaborative Information Extraction for Adaptive Recommendations in a Multiagent Tourism Recommender System48
Introduction48
The Collaborative Information Extraction for Adaptive Recommendations Add-On49
Information Extraction Agents49
Information Classification Agents50
Experiments52
Conclusions53
References53
An Architecture for the Design of Context-Aware Conversational Agents54
Introduction54
Our Architecture to Design Context-Awareness Conversational Agents55
Domain Application56
Conclusions59
References59
Modelling and Computation12
A Computational Model on Surprise and Its Effects on Agent Behaviour in Simulated Environments60
Introduction60
Theory61
Model62
Model Overview62
Event Evaluation63
Surprise Generation63
The Sensemaking Process65
The Effects of the Sensemaking Process66
Case Stud