Search results for "Computer Science::Multiagent Systems"
showing 10 items of 32 documents
Lazy consensus for networks with unknown but bounded disturbances
2007
We consider stationary consensus protocols for networks of dynamic agents. The measure of the neighbors' state is affected by Unknown But Bounded disturbances. Here the main contribution is the formulation and solution of what we call the isin-consensus problem, where the states are required to converge in a tube of ray isin asymptotically or in finite time.
"Table 25" of "Measurement of event shape and inclusive distributions at s**(1/2) = 130-GeV and 136-GeV."
1997
4-jet rate for the Jade Algorithm.
"Table 32" of "Tuning and test of fragmentation models based on identified particles and precision event shape data."
1996
Differential 4-jet rate for the JADE Algorithm. Corrected to final state particles. YCUT is the jet finding cutt-off parameter.
"Table 26" of "Measurement of event shape and inclusive distributions at s**(1/2) = 130-GeV and 136-GeV."
1997
5-jet rate for the Jade Algorithm.
Consensus for switched networks with unknown but bounded disturbances
2006
We consider stationary consensus protocols for networks of dynamic agents with switching topologies. The measure of the neighbors' state is affected by Unknown But Bounded disturbances. Here the main contribution is the formulation and solution of what we call the $\epsilon$-consensus problem, where the states are required to converge in a tube of ray $\epsilon$ asymptotically or in finite time.
A Similarity Evaluation Technique for Cooperative Problem Solving with a Group of Agents
1999
Evaluation of distance or similarity is very important in cooperative problem solving with a group of agents. Distance between problems is used by agents to recognize nearest solved problems for a new problem, distance between solutions is necessary to compare and evaluate the solutions made by different agents, and distance between agents is useful to evaluate weights of the agents to be able to integrate them by weighted voting. The goal of this paper is to develop a similarity evaluation technique to be used for cooperative problem solving with a group of agents. Virtual training environment used for this goal is represented by predicates that define relationships within three sets: prob…
On the Robust Synthesis of Logical Consensus Algorithms for Distributed Intrusion Detection
2013
We introduce a novel consensus mechanism by which the agents of a network can reach an agreement on the value of a shared logical vector function depending on binary input events. Based on results on the convergence of finite--state iteration systems, we provide a technique to design logical consensus systems that minimize the number of messages to be exchanged and the number of steps before consensus is reached, and that can tolerate a bounded number of failed or malicious agents. We provide sufficient joint conditions on the input visibility and the communication topology for the method's applicability. We describe the application of our method to two distributed network intrusion detecti…
Optimal Trajectories for Spacecraft Rendezvous
2007
The efficient execution of a rendezvous maneuver is an essential component of various types of space missions. This work describes the formulation and numerical investigation of the thrust function required to minimize the time or fuel required for the terminal phase of the rendezvous of two spacecraft. The particular rendezvous studied concerns a target spacecraft in a circular orbit and a chaser spacecraft with an initial separation distance and separation velocity in all three dimensions. First, the time-optimal rendezvous is investigated followed by the fuel-optimal rendezvous for three values of the max-thrust acceleration via the sequential gradient-restoration algorithm. Then, the ti…
Consensus-based Distributed Intrusion Detection for Multi-Robot Systems
2008
This paper addresses a security problem in robotic multi-agent systems, where agents are supposed to cooperate according to a shared protocol. A distributed Intrusion Detection System (IDS) is proposed here, that detects possible non-cooperative agents. Previous work by the authors showed how single monitors embedded on-board the agents can detect non- cooperative behavior, using only locally available information. In this paper, we allow such monitors to share the collected information in order to overcome their sensing limitation. In this perspective, we show how an agreement on the type of behavior of a target-robot may be reached by the monitors, through execution of a suitable consensu…
A multiagent system approach for image segmentation using genetic algorithms and extremal optimization heuristics
2006
We propose a new distributed image segmentation algorithm structured as a multiagent system composed of a set of segmentation agents and a coordinator agent. Starting from its own initial image, each segmentation agent performs the iterated conditional modes method, known as ICM, in applications based on Markov random fields, to obtain a sub-optimal segmented image. The coordinator agent diversifies the initial images using the genetic crossover and mutation operators along with the extremal optimization local search. This combination increases the efficiency of our algorithm and ensures its convergence to an optimal segmentation as it is shown through some experimental results.