skip to main content
10.1145/280765.280801acmconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
Article
Free Access

Market-based resource control for mobile agents

Authors Info & Claims
Published:01 May 1998Publication History
First page image

References

  1. CMM97.Anthony Chavez, Alexandros Moukas, and Pattie Maes. Challenger: A multiagent system for distributed resource allocation. In Proceedings of the International Conference on Autonomous Agents, pages 323-331, Marina Del Rey, CA, February 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Gra96.Robert S. Gray. Agent Tch A flexible and secure mobile-agent system. In Proceedings of the 1996 Tcl/Tk Workshop, pages 9-23, July 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Gra97.Robert Gray. Agent Tcl: A feeble and secure mobile-agent system. Phi) thesis, Dept. of Computer Science, Dartmouth College, June 1997, Available as Dartmouth Computer Science Technical Report TR98-327. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. GSW97.Alok Gupta, Dale O. Stahl, and Andrew B. Whinston. Priority pricing of integrated services networks. In Lee McKnight and J. P. Bailey, editors, {nternet Economics. MIT Press, 1997. To appear. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. KGN+97.David Kotz, Robert Gray, Saurab Not, Daniela Rus, Sumit Chawla, and George Cybenko. Agent Tch Targeting the needs of mobile computers. IEEE Internet Computing, 1(4):58-67, July/August 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. OLW97.John K. Ousterhout, Jacob Y. Levy, and Brent B. Welch. The Safe-Tcl security model. Technical report, Sun Microsystems Laboratories, 1997. In progress. Draft available at http:// w~.w.sunlabs.com/ people/ john, ousterhoul;/sa/eTcl, html. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. RGK97.Daniela Rus, Robert Gray, and David Kotz. Transportable information agents. Journal of intelligent Information Systems, 9:215-238, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. SL95.Tuomas W. Sandholm and Victor R. Lesser. Equilibrium analysis of the possibilities of unenforced exchange in multiagent systems. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence (IJCAI- 95), pages 694-701, Montreal, Canada, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. SL96.Tuomas W. Sandholm and Victor R. Lesser. Advantages of a leveled commitment contracting protocol. In Thirteenth National Conference on Artificial Intelligence, pages 126-133, Portland, Oregon, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Tan95.Mike Tanner. Practical Queueing Analysis. McGraw-Hill Book Company, London, 1995.Google ScholarGoogle Scholar
  11. Vic61.William Vickery. Counterspeculation, auctions, and competitive sealed tenders. Journal of Finance, 16:8-37, 1961.Google ScholarGoogle ScholarCross RefCross Ref
  12. Wel96.Michael P. Wellman. Market-oriented programming: Some early lessons. In Scott H. Clearwater, editor, Market-Based Control, chapter 4, pages 74-96. World Scientific, Singapore, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. WHH+92.Carl A. Waldspurger, Tad Hogg, Bernardo A. Huberman, Jeffzey O. Kephart, and W. Scott Stornetta. Spawn: A distributed computational economy. IEEE 2h~actions on Software Engi. neering, 18(2):103-117, February 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Whi94.James E. White. Telescript technology: The foundation for the electronic marketplace. General Magic White Paper, 1994.Google ScholarGoogle Scholar
  15. WW96.Carl A. Waldspurger and William E. Weihl. An object-oriented framework for modular resource management. In Proceedings of the Fifth international Workshop on Object Orientation in Operating Systems, pages 138-143. IEEE Computer Society Press, October 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Market-based resource control for mobile agents

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              AGENTS '98: Proceedings of the second international conference on Autonomous agents
              May 1998
              484 pages
              ISBN:0897919831
              DOI:10.1145/280765

              Copyright © 1998 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 May 1998

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              AGENTS '98 Paper Acceptance Rate57of180submissions,32%Overall Acceptance Rate182of599submissions,30%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader