skip to main content
research-article

Action Selection Algorithms for Autonomous System in Pervasive Environment: A Computational Approach

Published:01 February 2011Publication History
Skip Abstract Section

Abstract

Ubiquitous and pervasive computing deals with the design of autonomous and adaptive systems and services that interact with the closest environment enhanced by context awareness and emergence functionalities. In this article, we investigate the relationships between the environment, the actions (services), and the selection algorithm that is guaranteed to take the system to a state that suits a stochastically changing environment. Making the assumption that peering relationships between potential actions can be specified by an affinity network, the action selection mechanism is translated into an iterative algorithm that lets each activity update its strength until it converges to a solution. In pervasive environments, where services and devices interfere with each other, the proposed action selection approach prevents unexpected and undesirable behaviors or oscillating loops in a such dynamic environment.

Skip Supplemental Material Section

Supplemental Material

References

  1. Bakhouya, M. 2008. A reinforcement learning based approach for spontaneous service emergence in pervasive computing environments. Int. Trans. Syst. Sci. Appl. 4, 2, 181--187.Google ScholarGoogle Scholar
  2. Bakhouya, M. and J. Gaber. 2006. Adaptive approach for the regulation of a mobile agent population in a distributed network. In Proceedings of the International Symposium on Parallel and Distributed Computing (ISPDC’06). IEEE, 1132--1140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Farmer, J. D., Packard, N. H., and Perelson, A. 1986. The immune system, adaptation and machine learning. Physica 22D, 187--204. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Gaber, J. 2007. Spontaneous emergence model for pervasive environments. In Proceedings of the Globecom Workshops.Google ScholarGoogle ScholarCross RefCross Ref
  5. Holland, J. 1995. Escaping Brittleness: The Possibilities of General-Purpose Learning Algorithms Applied to Parallel Rule-Based Systems. In Computation and Intelligence: Collected Readings, G. F. Luger Ed. American Association for Artificial Intelligence, Menlo Park, CA, 275--304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Horn, R. and Johnson, C. 1999. Matrix Analysis. Cambridge University Press.Google ScholarGoogle Scholar
  7. Jerne, N. 1974. Towards a network theory of the immune system. Ann. Immunol. (Inst. Pasteur). 125, 373--389.Google ScholarGoogle Scholar
  8. Russell, S. and Norvig, P. 2006. Intelligence Artificielle. Pearson Education, France.Google ScholarGoogle Scholar
  9. Suzuki, J. and Yamamoto, Y. 2000. Building an artificial immune network for decentralized policy negotiation in a communication endsystem: Openwebserver/inexus study. In Proceedings of the 4th World Multiconference on Systemics, Cybernetics and Informatics.Google ScholarGoogle Scholar
  10. Watanabe, Y., Ishiguro, A., and Uchikawa, Y. 1998. Decentralized behavior arbitration mechanism for autonomous mobile robot using immune system. In Artificial Immune Systems and Their Applications. Springer, 186--208.Google ScholarGoogle Scholar
  11. Zamudio, V. and Callaghan, V. 2006. Unwanted periodic behaviour in pervasive computing environments. In Proceedings of the ACS/IEEE International Conference on Pervasive Services (ICPS’06). IEEE, 26--29. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Action Selection Algorithms for Autonomous System in Pervasive Environment: A Computational Approach

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!