Multi-agent Based File Replication and Consistency Management

Author(s):  
Serkan Akdemir ◽  
Nadia Erdoğan
2015 ◽  
Vol 25 (3) ◽  
pp. 439-454 ◽  
Author(s):  
Thao Phuong Pham ◽  
Mourad Rabah ◽  
Pascal Estraillier

AbstractDuring interactions, system actors may face up misunderstandings when their local states contain inconsistent data about the same fact. Misunderstandings in interactions are likely to reduce interactivity performances (deviation or deadlock) or even affect overall system behavior. In this paper, we characterize misunderstandings in interactions between system actors (that may be human users or system agents) in interactive adaptive systems. To deal with such misunderstandings and ensure state consistency, we present an agent-based architecture and a scenario structuring approach. The system includes several agents devoted to scenario unfolding, plot adaptation and consistency management. Scenario structuring is based on the notion of a situation that is an elementary building block dividing the interactions between systems’ actors into contextual scenes. This pattern supports not only scenario execution but consistency management as well. In order to organize and control interactions, the situation contextualizes interactions and activity of the system’s actors. It also includes prevention and tolerance agent-based mechanisms to deal with the misunderstandings and their causes. We validate our consistency management mechanisms using Uppaal simulation and provide some experimental results to show the effectiveness of our approach on an online distance learning case study


2013 ◽  
Vol 133 (9) ◽  
pp. 1652-1657 ◽  
Author(s):  
Takeshi Nagata ◽  
Kosuke Kato ◽  
Masahiro Utatani ◽  
Yuji Ueda ◽  
Kazuya Okamoto ◽  
...  

2020 ◽  
Vol 8 (1) ◽  
pp. 33-41
Author(s):  
Dr. S. Sarika ◽  

Phishing is a malicious and deliberate act of sending counterfeit messages or mimicking a webpage. The goal is either to steal sensitive credentials like login information and credit card details or to install malware on a victim’s machine. Browser-based cyber threats have become one of the biggest concerns in networked architectures. The most prolific form of browser attack is tabnabbing which happens in inactive browser tabs. In a tabnabbing attack, a fake page disguises itself as a genuine page to steal data. This paper presents a multi agent based tabnabbing detection technique. The method detects heuristic changes in a webpage when a tabnabbing attack happens and give a warning to the user. Experimental results show that the method performs better when compared with state of the art tabnabbing detection techniques.


Sign in / Sign up

Export Citation Format

Share Document