Pleiades Project at CMU.2.
helps a human secretary to plan theschedule of visitors to CMU•
matches their interests with the interestsand availability of the faculty and staff.•
organized as a number of agents thatretrieve the relevant pieces of informationfrom several different real-worldinformation sources, such as finger, onlinelibrary search etc.
Interface (Personal) Agents
Emphasize autonomy, and learningin order to perform useful tasks for their owners.
Examples1. Personal assistants that handle your appointments2. Office Agents in Microsoft Office.
"Learn" to serve the user better, byobserving and imitating the user, throughfeedback from the user, or by interactingwith other agents. The main challenge hereis how to assist the user without botheringhim, and how to learn effectively.
Information / Internet Agents
helping us to cope with the sheer "
tyranny of information
" in theInternet age.
manage, manipulate or collateinformation from many distributedsources.
respective motivations andchallenges
Functional challenges of managinginformation.
An agent server process runs on each participating host. Participating hosts arenetworked through links that can be low- bandwidth and unreliable. An agent is aserializable object – an object whose data aswell as state can be marshaled for transportation over the network. Datamarshaling is required for flattening andendoding of data structures, so that they can be sent from one computer to another. Anobject similarly serialized and transmitted between hosts [5-7]. Upon arrival, the objectcan be reconstituted and de-serialized, withits execution state restored to when it wasserialized, and then the object can resumeexecution on the newly-arrived host system;i.e. whose execution state can be frozen for transportation and reconstituted upon arrivalat a remote site.
Advantages of the agent paradigm
Reducing traffic / congestion as agentsare smaller in size
Enhanced security over protected dataespecially in a broadcast mode
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 9, No. 1, January 2011183http://sites.google.com/site/ijcsis/ISSN 1947-5500