Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Defense industry applications of autonomous agents and multi-agent systems (Whitestein Series in Software Agent Technologies and Autonomic Computing) (1st ed.)
Pechoucek M., Thompson S., Voos H., Birkhäuser Basel, 2008. 166 pp. Type: Book (9783764385705)
Date Reviewed: Mar 5 2009

Network-centric warfare (NCW) aims to exploit modern communications and information processing technologies, through the effective networking of heterogeneous geographically dispersed forces, to deliver a competitive advantage to military operations (for background information, you may want to read my earlier review on this topic [1]).

A foundational element in NCW is the ability to collect, distribute, correlate, and process information collected by various assets: sensors, humans, information systems, and databases. This, in turn, implies the availability of a flexible infrastructure to integrate unmanned systems in the battlefield, agile logistics, and systems to model and predict adversary intent. In many cases, the applications sitting on top of such infrastructure operate in highly decentralized environments, where centralized supervision needs to be supplemented by autonomous, intelligent decision making.

This new book provides a collection of refereed papers published in the last two years on the topic of intelligent autonomous agents and their application to command and control systems, military communications, surveillance systems, autonomous systems, and human-computer interfaces. The broad range of applications and techniques presented offers a varied overview of the state of the art. The nine chapters that compose the book are grouped in three loosely structured sections; readers can cover them in whatever order they choose.

The first section covers multiagent approaches to the development of information infrastructures (peer-to-peer middleware, information-based control of sensor networks, semantic matchmaking of intelligence resources, and agent applications in defense logistics). The second section deals with agent-based technologies in air-traffic control (multiagent technology for free-flight air traffic control, control of teams of unmanned air vehicles, fighter-pilot simulation, and wargaming using multiagent systems). The third and final section discusses the use of agents for simulation and training.

The book is an interesting read if you want to learn more about practical applications of intelligent agents in the defense domain. Interested readers are also referred to the IEEE/WIC/ACM International Conference on Intelligent Agent Technology [2] to obtain additional up-to-date information on related topics.

Reviewer:  Alessandro Berni Review #: CR136561 (1001-0031)
1) Berni, A. Review of Net-centric approaches to intelligence and national security. Computing Reviews, CR132861 (0704-0311), http://www.reviews.com/review/review_review.cfm?review_id=132861, 2006.
2) , Intelligent Agent Technology 2009 IEEE/WIC/ACM http://www.wi-iat09.disco.unimib.it/IAT09/IAThome.htm (01/06/2009).
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Intelligent Agents (I.2.11 ... )
 
 
Military (J.7 ... )
 
 
Multiagent Systems (I.2.11 ... )
 
 
Distributed Artificial Intelligence (I.2.11 )
 
 
General (I.6.0 )
 
 
User/ Machine Systems (H.1.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Intelligent Agents": Date
Developing intelligent agents for distributed systems
Knapik M., Johnson J., McGraw-Hill, Inc., New York, NY, 1998. Type: Book (9780070350113)
Aug 1 1998
Autonomous, model-based diagnosis agents
Schroeder M., Kluwer Academic Publishers, Norwell, MA, 1998. Type: Book (9780792381426)
Dec 1 1998
Intelligent software agents
Murch R., Johnson T., Prentice Hall PTR, Upper Saddle River, NJ, 1999. Type: Book (9780130110213)
Feb 1 1999
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy