Yesterday I attend a MASON workshop. People came from all over the world to present how they are using MASON to do agent based modeling.
Uncategorized
Ten holes on a white background
_________________________________
| |
| o o o o o |
| o o o o o |
| |
|_______________________________|
Above is an exact replica of ten holes on a white background that Nil and I saw today at an art museum. Only the background was a white wall and the holes were drilled into the wall.
_________________________________
| |
| o o o o o |
| o o o o o |
| o |
|_______________________________|
Our contribution to the art world is Eleven holes on a white background :).
Some of the art had these black pieces of tape on the floor surrounding them so if someone crossed the black tap a beep would sound and a security person would tell you to step away from the art. So, we need a break so we found the average time between someone setting the alarms off :). It was 40 seconds! So on average every 40 seconds someone crossed one of those black lines. They really should have used a brighter color other than black like red that maybe even had words like do not cross.
Reverse Double Dutch Auction
Seems like an interesting idea for Courier World. Description of a Double Dutch Auction from (Introducing interaction-based auctions into a model agent-based e-commerce system—preliminary considerations):
This auction is relatively counterintuitive and in
its basic version works like this (based on [1]): a buyer
price clock starts ticking at a very high price and continues
downward. At some point the buyer stops the clock
and bids on the unit at a favorable price. At this point
a seller clock starts upward from a very low price and
continues to ascend until stopped by a seller (who offers
product at that price). Then the buyer clock resumes in a
downward direction, followed by the seller clock moving
upward. Trading is over when the two prices cross
(purchase is made at the crossover point).
So a reverse version would be the above just in reverse.
Using Twitter as a proxy for malicious intent
Today I went to a security talk and the speaker gave a demonstration of how when you tweet a link various “robots” will follow the link and index it and do other things. He gave a couple of example of what could be done. One example was tweeting links to login forms with valid user id but invalid password. Since most login forms will lock the user out after some number of tries this will annoy users. Especially since based on his research the links will be revisited long into the future. So, the user may have to reset their password multiple times. If you had all of the usernames one could lockout all of the users without anyone knowing it was you who did it.
He also was trying to actually figure out whether it was a human that actually attempted to load the link. So, he discovered that different browsers have a certain cut off on the number of 403 redirects it will handle before quitting. However, he has found that many bots will just continue to follow the redirects.
He also showed some other cool hacks. The spring lunch group went out with a bang :)!
Regender websites
Interesting idea to regender text: http://regender.com/index.html. Maybe websites could use this based on a profile of the person that is entering their website to change the text they display.
xkcd: Lisp
The Edge of Chaos
The point of maximal complexity. The system is extremely unstable. They have the ability to exhibit emergent computation. http://vserver1.cscs.lsa.umich.edu/~spage/ONLINECOURSE/R3CA2.pdf
Seems related to older ideas.
Trying a new theme
See how I like this new theme called responsive. I think I will like it better because it is wider. However, I switched back to the grunge wall because it was taking too long to set up…
Integrating Agent Models
In my earlier post I was considering combining game theory and measure theory methodologies of MAS and swarm systems. From my research into this topic I found this paper https://jacobstechnology.com/acs/pdf/ESOA06Hybrid.pdf. Although it seems like the people who published it are respectable, the paper has never been cited. Which is strange since it is an interesting topic. They came to the same questions I have about combining agent/swarm methodologies.
To what extent can we construct a unified development methodology that supports
both extremes (and thus intermediate agent types as well)? It is clumsy to have to use
one methodology [38] for BDI agents, and a completely separate one [26] for
swarming agents. Hybrid systems will only become commonplace when both kinds of
agents can be developed within an integrated framework.
They believe that integrating different agent models is an important problem.
Also, before that paper was published, GMU had published a paper Cooperative Multiagent Learning: The State of the Art. In their conclusion they stated the need for Team Heterogeneity. Meaning that the team is composed of agents with differing abilities. They also make the case for when the team is too large that the agent’s abilities can’t all be different. This is the conclusion I came to. For example, when there are swarms interacting with more complex multiagent systems. How do they cooperate and learn from each other? What is the framework for such interaction? How can the agent’s mathematical underpinnings act as a catalyst for communication for teaching/learning? Can a universal framework be developed?
Measuring Complexity
I would like to be able to measure the complexity of agents to determine whether a system is really a swarm or if it is a multiagent learning system etc. A discussion of complexity measures: http://tinyurl.com/measurecomplex. By knowing the type of system an outside agent can better adapt to, learn from, or manipulate the system.