iAccess is a trust negotiation-based authorization service.
It provides entities with the right to protect their own credentials and negotiate with remote (unknown) servers access to resources. iAccess works with X.509 and SAML standards.
Modular, agent-oriented and extendable agent toolkit.
Ellipsis is a modular, agent-oriented, and extendable toolkit to execute stationary and mobile software agents written in the Java programming language. Ellipsis uses the standard application server JBoss (version 4.2.3 GA) without any modifications.
In contrast to existing mobile agent toolkits, Ellipsis has an agent- and message-oriented architecture. Ellipsis is built on top of the JMX architecture. Core Ellipsis components are implemented as MBeans which provides for basic ser-vices to execute agents and control their life-cycle. ...
Software agents and human actors combine their decision making skills to arrive at efficient solutions to real-life planning and scheduling problems, especially in domains where unexpected incidents require changes to existing plans.
A software toolkit that implements the CoSy Architecture Schema for developing integrated intelligent robotic systems. The toolkit focuses on supporting on a space of information-processing architectures based on shared working memories.
Justhink is a framework for develop artificial intelligence simulations. The Framework provides a simulation software and an API to develop external modules that are plugged into simulation, such as the problem/mission and artificial intelligence modules
nu-BDI is an extension of the Jason agent interpreter aimed at processing norms using constraints on the agent's instantiated plans. The core agent reasoning cycle now includes a component for processing norms and enforcing norm constraints.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
The aim of ALIVE is to develop new approaches to the engineering of flexible, adaptable distributed service-oriented systems based on the adaptation of social coordination and organisation mechanisms.
Siafu simulates individual agents and their context, from home to city-wide scenarios. As a developer, you use the API to write your simulation for the purposes of data-set generation, test or visualization, optionally hooking it to your own application.
This project aims to test Distributed Artifitial Intelligence in a urban traffic light control. GlobalSyncLocal is used to interact with the SUMO simulator through the TraSMAPI.
The JSparse Matrix Package, developed by Philipp Geigenmüller during an internship at the prudsys AG in Chemnitz, Germany, is an extension of the well-known Java Matrix Package (JAMA) and allows the use of sparse matrices and related algorithms.
A java-swing application that provides a tree-view of a jena rdf-graph.
This is a tool for developers utilizing jena or pellet who wish to see what is going on within their jena-model when inference occurs.
easy fusion is a java-based framework that intends to automatically deploy and control information fusion systems (IFS) on distributed and dynamic resources.
Web-as-corpus tools in Java.
* Simple Crawler (and also integration with Nutch and Heritrix)
* HTML cleaner to remove boiler plate code
* Language recognition
* Corpus builder
Agent inter-platform mobility service for the well-known JADE agent platform. This service allows software agents to move from one execution platform to the next, carrying their own data and state, and resuming their execution upon arrival.
A demonstration of the result of using an agent based approach in software. Shows a swarm of icons representing agents that follow user selected rules.
Security is a subject of major concern in mobile agents. This project provides a security framework that allows the protection of mobile agents from third parties. A self-protected approach, where the agents themselves manage the process, is used.
This chess program changes its strength to give the best match against you. Eventually it learns to beat you specifically through learning alogirthms. Features included transposition tables and a elementary 3-piece endgame tablebase.