2017
DOI: 10.14201/adcaij201761932
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis of Software Agents, Environ-ments and Applications School (WESAAC): Retrospective, Relevance, and Trends

Abstract: Multi-Agent Systems (MAS) software has been increasing dramatically in last years. In this context, the Software Agents, Environments and Applications School (WESAAC) is a Brazilian event of MAS which is in its tenth edition. When studying a research area, it is important to identify the most active groups, topics, the research trends and so forth. This study aims to investigate how the WESAAC is evolving, by analysing the papers published in its ten editions. We adopted a research strategy that combines scopi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…The number of heterogeneous «things» such as buildings, machines, vehicles, homes, people connected to the Internet or to each other through electronic devices that communicate using a set of standard protocols, form a set of networks that can generate, process, store and obtain useful information for organizations. The EC allows the optimization of computing processes as it does not depend on cloud computing for the execution of these processes [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30].…”
Section: ]mentioning
confidence: 99%
“…The number of heterogeneous «things» such as buildings, machines, vehicles, homes, people connected to the Internet or to each other through electronic devices that communicate using a set of standard protocols, form a set of networks that can generate, process, store and obtain useful information for organizations. The EC allows the optimization of computing processes as it does not depend on cloud computing for the execution of these processes [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30].…”
Section: ]mentioning
confidence: 99%
“…They follow the rest of the steps of the BB84 protocol to exchange the key. Remember that the last step of the BB84 algorithm discards the values that have not matched [46][47][48][49][50][51][52][53].…”
Section: Practical Example Of Protocol Use Bb84mentioning
confidence: 99%
“…In relation to this issue, the Edge Computing (EC) paradigm, with the idea of supporting devices with a cloud closer to the edge of the network, appears as an attractive solution. However, adding Edge resources complicates network management, as several devices will face them [56][57][58][59][60][61][62][63].…”
Section: Edge Computing and Fog Computingmentioning
confidence: 99%