ABSTRACT A strategy for the analytical solving of ordinary differential equations and a first imp... more ABSTRACT A strategy for the analytical solving of ordinary differential equations and a first implementation of it based on mobile agent community, using jini Numerical algorithms are already designed in many domains such that electromagnetism, fluid theory. Numerical codes were developed from these mathematical analyses with interesting performance. Our work is about our runtime platform to execute existing numerical codes by the use of mobile agents. They act as workers which manage parts of a numerical code on a set of computers.
ABSTRACT: Agent Modeling Language (AML) is a semiformal visual modeling language for specifying, ... more ABSTRACT: Agent Modeling Language (AML) is a semiformal visual modeling language for specifying, modeling and documenting systems in terms of concepts drawn from Multi Agent Modeling (MAS) theory. Supply chain management (SCM) is the management of network ...
EUROCON 2005 - The International Conference on "Computer as a Tool", 2005
... security control because the J2ME client contains now some new actions which are observed by ... more ... security control because the J2ME client contains now some new actions which are observed by a security manager. The jad files are also written to authorize the kind of action the monitor can do. 54 Page 4. Virtual Machine of Figure 4: dynamic class loading during register step ...
The AAFID structure is a distributed monitoring and intrusion detection system. The first concept... more The AAFID structure is a distributed monitoring and intrusion detection system. The first concept comes from CERIAS group at Purdue University. This architecture employs small stand-alone programs (Agents) to perform policy of security in the hosts of a network. AAFID is designed as a hierarchical structure of components with agents at the lowest level of the tree performing the most
2009 IEEE Conference on Emerging Technologies & Factory Automation, 2009
To develop and demonstrate accurate allocation and placement on network, we implemented a flexibl... more To develop and demonstrate accurate allocation and placement on network, we implemented a flexible location framework which is able to use RFID sensors for authentication and positioning adequate software environment. This application is particularly useful in an evolving network where a workstation is not dedicated to a specific use or user. Each user has own RFID badge and each workstation
ABSTRACT The problem of real size system modelling with basic concurrency models like transition ... more ABSTRACT The problem of real size system modelling with basic concurrency models like transition systems, Petri nets or process algebra is that there is no possibility to model easily the system data structures. Algebraic specification is a method well adapted to this last aspect and has been chosen to be mixed with the two major concurrency models which are process algebra and Petri nets. We present in this paper how the 'mixing' is done and what are the consequences concerning concurrency through the case of Lotos and Algebraic nets. Our approach is built on a simple case study which is given in several versions with both formalisms. The first one uses the basic models without algebraic specifications to highlight the data structures modelling problem. The second one is used to present how algebraic specifications are integrated in each concurrency model and the last one focuses on the concurrency aspects. Several propositions are then given in order to enhance the mixing of algebraic specifications and Petri nets or process algebra. Keywords : Petri net, process algebra, data types, algebraic specification, algebraic net, Lotos.
2008 Third International Conference on Convergence and Hybrid Information Technology, 2008
... Mâamoun Bernichi, Fabrice Mourlin LACL, Paris 12 University, France b_maamoun@yahoo. fr, fabr... more ... Mâamoun Bernichi, Fabrice Mourlin LACL, Paris 12 University, France b_maamoun@yahoo. fr, fabrice.mourlin@wanadoo.fr Abstract ... In another study realized by C. Flack and MJ Atallah [9] is defined a method of analysis grammatical to reformat logs to detect the "anomalies". ...
2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006
This paper presents a communication scheme for flexible and adaptive mobile agent system (or comm... more This paper presents a communication scheme for flexible and adaptive mobile agent system (or community of agent). The scheme associates each mobile agent with a set of roles, each of them belong to a communication layer. This allows the decoupling between the roles and physical locations or responsibilities of the mobile agents. Thus, the messages are typed by the layer
ABSTRACT A strategy for the analytical solving of ordinary differential equations and a first imp... more ABSTRACT A strategy for the analytical solving of ordinary differential equations and a first implementation of it based on mobile agent community, using jini Numerical algorithms are already designed in many domains such that electromagnetism, fluid theory. Numerical codes were developed from these mathematical analyses with interesting performance. Our work is about our runtime platform to execute existing numerical codes by the use of mobile agents. They act as workers which manage parts of a numerical code on a set of computers.
ABSTRACT: Agent Modeling Language (AML) is a semiformal visual modeling language for specifying, ... more ABSTRACT: Agent Modeling Language (AML) is a semiformal visual modeling language for specifying, modeling and documenting systems in terms of concepts drawn from Multi Agent Modeling (MAS) theory. Supply chain management (SCM) is the management of network ...
EUROCON 2005 - The International Conference on "Computer as a Tool", 2005
... security control because the J2ME client contains now some new actions which are observed by ... more ... security control because the J2ME client contains now some new actions which are observed by a security manager. The jad files are also written to authorize the kind of action the monitor can do. 54 Page 4. Virtual Machine of Figure 4: dynamic class loading during register step ...
The AAFID structure is a distributed monitoring and intrusion detection system. The first concept... more The AAFID structure is a distributed monitoring and intrusion detection system. The first concept comes from CERIAS group at Purdue University. This architecture employs small stand-alone programs (Agents) to perform policy of security in the hosts of a network. AAFID is designed as a hierarchical structure of components with agents at the lowest level of the tree performing the most
2009 IEEE Conference on Emerging Technologies & Factory Automation, 2009
To develop and demonstrate accurate allocation and placement on network, we implemented a flexibl... more To develop and demonstrate accurate allocation and placement on network, we implemented a flexible location framework which is able to use RFID sensors for authentication and positioning adequate software environment. This application is particularly useful in an evolving network where a workstation is not dedicated to a specific use or user. Each user has own RFID badge and each workstation
ABSTRACT The problem of real size system modelling with basic concurrency models like transition ... more ABSTRACT The problem of real size system modelling with basic concurrency models like transition systems, Petri nets or process algebra is that there is no possibility to model easily the system data structures. Algebraic specification is a method well adapted to this last aspect and has been chosen to be mixed with the two major concurrency models which are process algebra and Petri nets. We present in this paper how the 'mixing' is done and what are the consequences concerning concurrency through the case of Lotos and Algebraic nets. Our approach is built on a simple case study which is given in several versions with both formalisms. The first one uses the basic models without algebraic specifications to highlight the data structures modelling problem. The second one is used to present how algebraic specifications are integrated in each concurrency model and the last one focuses on the concurrency aspects. Several propositions are then given in order to enhance the mixing of algebraic specifications and Petri nets or process algebra. Keywords : Petri net, process algebra, data types, algebraic specification, algebraic net, Lotos.
2008 Third International Conference on Convergence and Hybrid Information Technology, 2008
... Mâamoun Bernichi, Fabrice Mourlin LACL, Paris 12 University, France b_maamoun@yahoo. fr, fabr... more ... Mâamoun Bernichi, Fabrice Mourlin LACL, Paris 12 University, France b_maamoun@yahoo. fr, fabrice.mourlin@wanadoo.fr Abstract ... In another study realized by C. Flack and MJ Atallah [9] is defined a method of analysis grammatical to reformat logs to detect the "anomalies". ...
2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006
This paper presents a communication scheme for flexible and adaptive mobile agent system (or comm... more This paper presents a communication scheme for flexible and adaptive mobile agent system (or community of agent). The scheme associates each mobile agent with a set of roles, each of them belong to a communication layer. This allows the decoupling between the roles and physical locations or responsibilities of the mobile agents. Thus, the messages are typed by the layer
Uploads
Papers by Fabrice Mourlin