Results 1 - 10
of
361
Wrapper Induction for Information Extraction
, 1997
"... The Internet presents numerous sources of useful information---telephone directories, product catalogs, stock quotes, weather forecasts, etc. Recently, many systems have been built that automatically gather and manipulate such information on a user's behalf. However, these resources are usually ..."
Abstract
-
Cited by 624 (30 self)
- Add to MetaCart
The Internet presents numerous sources of useful information---telephone directories, product catalogs, stock quotes, weather forecasts, etc. Recently, many systems have been built that automatically gather and manipulate such information on a user's behalf. However, these resources are usually formatted for use by people (e.g., the relevant content is embedded in HTML pages), so extracting their content is difficult. Wrappers are often used for this purpose. A wrapper is a procedure for extracting a particular resource's content. Unfortunately, hand-coding wrappers is tedious. We introduce wrapper induction, a technique for automatically constructing wrappers. Our techniques can be described in terms of three main contributions. First, we pose the problem of wrapper construction as one of inductive learn...
Developing multi-agent systems with JADE
- Wiley Series in Agent Technology
, 2007
"... Abstract. JADE (Java Agent Development Framework) is a software framework to make easy the development of multi-agent applications in compliance with the FIPA specifications. JADE can then be considered a middle-ware that implements an efficient agent platform and supports the development of multi a ..."
Abstract
-
Cited by 320 (5 self)
- Add to MetaCart
(Show Context)
Abstract. JADE (Java Agent Development Framework) is a software framework to make easy the development of multi-agent applications in compliance with the FIPA specifications. JADE can then be considered a middle-ware that implements an efficient agent platform and supports the development of multi agent systems. JADE agent platform tries to keep high the performance of a distributed agent system implemented with the Java language. In particular, its communication architecture tries to offer flexible and efficient messaging, transparently choosing the best transport available and leveraging state-of-the-art distributed object technology embedded within Java runtime environment. JADE uses an agent model and Java implementation that allow good runtime efficiency, software reuse, agent mobility and the realization of different agent architectures. 1.
Wrapper Induction: Efficiency and Expressiveness
- Artificial Intelligence
, 2000
"... The Internet presents numerous sources of useful information---telephone directories, product catalogs, stock quotes, event listings, etc. Recently, many systems have been built that automatically gather and manipulate such information on a user's behalf. However, these resources are usually fo ..."
Abstract
-
Cited by 267 (11 self)
- Add to MetaCart
(Show Context)
The Internet presents numerous sources of useful information---telephone directories, product catalogs, stock quotes, event listings, etc. Recently, many systems have been built that automatically gather and manipulate such information on a user's behalf. However, these resources are usually formatted for use by people (e.g., the relevant content is embedded in HTML pages), so extracting their content is difficult. Most systems use customized wrapper procedures to perform this extraction task. Unfortunately, writing wrappers is tedious and error-prone. As an alternative, we advocate wrapper induction, a technique for automatically constructing wrappers. In this article, we describe six wrapper classes, and use a combination of empirical and analytical techniques to evaluate the computational tradeoffs among them. We first consider expressiveness: how well the classes can handle actual Internet resources, and the extent to which wrappers in one class can mimic those in another. We then...
An Architecture for Intrusion Detection using Autonomous Agents
, 1998
"... The Intrusion Detection System architectures commonly used in commercial and research systems have a number of problems that limit their congurability, scalability or efficiency. The most common shortcoming in the existing architectures is that they are built around a single monolithic entity that d ..."
Abstract
-
Cited by 202 (10 self)
- Add to MetaCart
(Show Context)
The Intrusion Detection System architectures commonly used in commercial and research systems have a number of problems that limit their congurability, scalability or efficiency. The most common shortcoming in the existing architectures is that they are built around a single monolithic entity that does most of the data collection and processing. In this paper, we review our architecture for a distributed Intrusion Detection System based on multiple independent entities working collectively. We call these entities Autonomous Agents. This approach solves some of the problems previously mentioned. We present the motivation and description of the approach, partial results obtained from an early prototype, a discussion of design and implementation issues, and directions for future work.
The case for social agency in computer-based teaching: Do students learn more deeply when they interact with animated pedagogical agents
- Cognition and Instruction
, 2001
"... how to design the roots, stem, and leaves of plants to survive in 8 different environ-ments through a computer-based multimedia lesson. They learned by interacting with an animated pedagogical agent who spoke to them (Group PA) or received identical graphics and explanations as on-screen text withou ..."
Abstract
-
Cited by 154 (6 self)
- Add to MetaCart
(Show Context)
how to design the roots, stem, and leaves of plants to survive in 8 different environ-ments through a computer-based multimedia lesson. They learned by interacting with an animated pedagogical agent who spoke to them (Group PA) or received identical graphics and explanations as on-screen text without a pedagogical agent (Group No PA). Group PA outperformed Group No PA on transfer tests and interest ratings but not on retention tests. To investigate further the basis for this personal agent effect, we varied the interactivity of the agent-based lesson (Experiment 3) and found an
Experiences creating three implementations of the Repast agent modeling toolkit
- ACM Transactions on Modeling and Computer Simulation
, 2006
"... Many agent-based modeling and simulation researchers and practitioners have called for varying levels of simulation interoperability ranging from shared software architectures to common agent communications languages. These calls have been at least partially answered by several specifications and te ..."
Abstract
-
Cited by 129 (6 self)
- Add to MetaCart
Many agent-based modeling and simulation researchers and practitioners have called for varying levels of simulation interoperability ranging from shared software architectures to common agent communications languages. These calls have been at least partially answered by several specifications and technologies. In fact, Tanenbaum [1988] has remarked that the “nice thing about standards is that there are so many to choose from. ” Tanenbaum goes on to say that “if you do not like any of them, you can just wait for next year’s model. ” This article does not seek to introduce next year’s model. Rather, the goal is to contribute to the larger simulation community the authors’ accumulated experiences from developing several implementations of an agent-based simulation toolkit. As such, this article focuses on the implementation of simulation architectures rather than agent communications languages. It is hoped that ongoing architecture standards efforts will benefit from this new knowledge and use it to produce architecture standards with increased robustness.
What Is a Conversation Policy?
- IN PROCEEDINGS OF THE WORKSHOP ON SPECIFYING AND IMPLEMENTING CONVERSATION POLICIES, AUTONOMOUS AGENTS ’99
"... In this paper we define the concept of conversation policies: declarative specifications that govern communications between software agents using an agent communication language. We discuss the role that conversation policies play in agent communication, and suggest several subtypes of conversa ..."
Abstract
-
Cited by 106 (6 self)
- Add to MetaCart
(Show Context)
In this paper we define the concept of conversation policies: declarative specifications that govern communications between software agents using an agent communication language. We discuss the role that conversation policies play in agent communication, and suggest several subtypes of conversation policy. Our reasoning suggests, contrary to current transition net approaches to specifying conversation policies that conversation policies are best modeled as sets of fine-grained constraints on ACL usage. These constraints then define the computational process models that are implemented in agents.
Intrusion detection using autonomous agents
, 2000
"... AAFID is a distributed intrusion detection architecture and system, developed in CERIAS at Purdue University. AAFID was the first architecture that proposed the use of autonomous agents for doing intrusion detection. With its prototype implementation, it constitutes a useful framework for the resear ..."
Abstract
-
Cited by 99 (3 self)
- Add to MetaCart
AAFID is a distributed intrusion detection architecture and system, developed in CERIAS at Purdue University. AAFID was the first architecture that proposed the use of autonomous agents for doing intrusion detection. With its prototype implementation, it constitutes a useful framework for the research and testing of intrusion detection algorithms and mechanisms. We describe the AAFID architecture and the existing prototype, as well as some design and
A Real-Life Experiment in Creating an Agent Marketplace
- In: Proceedings of the Second International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, PAAM'97, The Practical Application Company Ltd
, 1997
"... Software agents help people with time consuming activities. One increasingly popular application for software agents is electronic commerce, namely having agents buy and sell goods and services on behalf of users. We recently conducted a real-life experiment in creating an agent marketplace, using a ..."
Abstract
-
Cited by 81 (11 self)
- Add to MetaCart
(Show Context)
Software agents help people with time consuming activities. One increasingly popular application for software agents is electronic commerce, namely having agents buy and sell goods and services on behalf of users. We recently conducted a real-life experiment in creating an agent marketplace, using a slightly modified version of the Kasbah system [Chavez96]. Approximately 200 participants intensively interacted with the system over a one-day, six-hour period. This paper describes the setup of the experiment, the architecture of the electronic market and the behaviors of the agents. We discuss the rationale behind the design decisions and analyze the results obtained. We conclude with a discussion of current experiments involving thousands of users interacting with the agent marketplace over a long period of time, and speculate on the long-range impact of this technology upon society and the economy. 1. Introduction Software agents help people with time consuming activities [Maes95]. In...
Information agent technology for the Internet: a survey
- Data and Knowledge engineering
"... The vast amount of heterogeneous information sources available in the Internet demands advanced solutions for acquiring, mediating, and maintaining relevant information for the common user. Intelligent information agents are autonomous computational software entities that are especially meant for (1 ..."
Abstract
-
Cited by 74 (4 self)
- Add to MetaCart
The vast amount of heterogeneous information sources available in the Internet demands advanced solutions for acquiring, mediating, and maintaining relevant information for the common user. Intelligent information agents are autonomous computational software entities that are especially meant for (1) to provide a pro-active resource discovery, (2) to resolve information impedance of information consumers and providers, and (3) to offer value-added information services and products. These agents are supposed to cope with the difficulties associated with the information overload of the user preferably just in time. Based on a systematic classification of intelligent information agents this paper presents an overview of basic key enabling technologies needed to build such agents, and respective examples of information agent systems currently deployed on the Internet.