Author
Munindar P. Singh
Other affiliations: Motilal Nehru National Institute of Technology Allahabad, University of South Carolina, University of Texas at Austin ...read more
Bio: Munindar P. Singh is an academic researcher from North Carolina State University. The author has contributed to research in topics: Multi-agent system & Autonomous agent. The author has an hindex of 62, co-authored 580 publications receiving 20279 citations. Previous affiliations of Munindar P. Singh include Motilal Nehru National Institute of Technology Allahabad & University of South Carolina.
Papers published on a yearly basis
Papers
More filters
•
01 Jan 2005TL;DR: This series describes the key concepts and abstractions of SOC and the elements of a corresponding engineering methodology and explains how to deploy Web services in accord with current standards.
Abstract: Traditional approaches to software development - the ones embodied in CASE tools and modeling frameworks - are appropriate for building individual software components, but they are not designed to face the challenges of open environments. Service-oriented computing provides a way to create a new architecture that reflects components' trends toward autonomy and heterogeneity. We thus emphasize SOC concepts instead of how to deploy Web services in accord with current standards. To begin the series, we describe the key concepts and abstractions of SOC and the elements of a corresponding engineering methodology.
1,207 citations
•
01 Jan 2010
TL;DR: This paper presents a meta-answering of the principles of Service-Oriented Computing with a focus on how to model and manage engagement in the context of web services.
Abstract: About the Authors.Preface.Note to the Reader.Acknowledgments.Figures.Tables.Listings.I Basics.1. Computing with Services.2. Basic Standards for Web Services.3. Programming Web Services.4. Enterprise Architectures.5. Principles of Service-Oriented Computing.II Description.6. Modeling and Representation.7. Resource Description Framework.8. Web Ontology Language.9. Ontology Management.III Engagement.10. Execution Models.11. Transaction Concepts.12. Coordination Frameworks for Web Services.13. Process Specifications.14. Formal Specification and Enactment.IV Collaboration.15. Agents.16. Multiagent Systems.17. Organizations.18. Communication.V Solutions.19. Semantic Service Solutions.20. Social Service Selection.21. Economic Service Selection.VI Engineering.22. Building SOC Applications.23. Service Management.24. Security.VII Directions.25. Challenge and Extensions.VIII Appendices.Appendix A: XML and XML Schema.Appendix B: URI, URN, URL and UUID.Appendix C: XML Namespace Abbreviations.Glossary.About the Authors.Bibliography.Index.
630 citations
••
TL;DR: This article addresses dynamic service selection via an agent framework coupled with a QoS ontology with the aim of enabling participants to collaborate to determine each other's service quality and trustworthiness.
Abstract: Current Web services standards lack the means for expressing a service's nonfunctional attributes - namely, its quality of service. QoS can be objective (encompassing reliability, availability, and request-to-response time) or subjective (focusing on user experience). QoS attributes are key to dynamically selecting the services that best meet user needs. This article addresses dynamic service selection via an agent framework coupled with a QoS ontology. With this approach, participants can collaborate to determine each other's service quality and trustworthiness.
615 citations
••
15 Jul 2002TL;DR: This approach adapts the mathematical theory of evidence to represent and propagate the ratings that agents give to their correspondents and establishes that some important properties of trust are captured by it.
Abstract: For agents to function effectively in large and open networks, they must ensure that their correspondents, i.e., the agents they interact with, are trustworthy. Since no central authorities may exist, the only way agents can find trustworthy correspondents is by collaborating with others to identify those whose past behavior has been untrustworthy. In other words, finding trustworthy correspondents reduces to the problem of distributed reputation management.Our approach adapts the mathematical theory of evidence to represent and propagate the ratings that agents give to their correspondents. When evaluating the trustworthiness of a correspondent, an agent combines its local evidence (based on direct prior interactions with the correspondent) with the testimonies of other agents regarding the same correspondent. We experimentally studied this approach to establish that some important properties of trust are captured by it.
610 citations
••
TL;DR: A survey of routing protocols for Wireless Sensor Network is given and their strengths and limitations are compared.
Abstract: Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. Variety of sensing capabilities results in profusion of application areas. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.
582 citations
Cited by
More filters
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.
10,141 citations
••
[...]
TL;DR: In this paper, a sedimentological core and petrographic characterisation of samples from eleven boreholes from the Lower Carboniferous of Bowland Basin (Northwest England) is presented.
Abstract: Deposits of clastic carbonate-dominated (calciclastic) sedimentary slope systems in the rock record have been identified mostly as linearly-consistent carbonate apron deposits, even though most ancient clastic carbonate slope deposits fit the submarine fan systems better. Calciclastic submarine fans are consequently rarely described and are poorly understood. Subsequently, very little is known especially in mud-dominated calciclastic submarine fan systems. Presented in this study are a sedimentological core and petrographic characterisation of samples from eleven boreholes from the Lower Carboniferous of Bowland Basin (Northwest England) that reveals a >250 m thick calciturbidite complex deposited in a calciclastic submarine fan setting. Seven facies are recognised from core and thin section characterisation and are grouped into three carbonate turbidite sequences. They include: 1) Calciturbidites, comprising mostly of highto low-density, wavy-laminated bioclast-rich facies; 2) low-density densite mudstones which are characterised by planar laminated and unlaminated muddominated facies; and 3) Calcidebrites which are muddy or hyper-concentrated debrisflow deposits occurring as poorly-sorted, chaotic, mud-supported floatstones. These
9,929 citations
•
9,185 citations