Munindar P. Singh

ORCID: 0000-0003-3599-3893
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Multi-Agent Systems and Negotiation
  • Business Process Modeling and Analysis
  • Service-Oriented Architecture and Web Services
  • Logic, Reasoning, and Knowledge
  • Semantic Web and Ontologies
  • Access Control and Trust
  • Peer-to-Peer Network Technologies
  • Distributed systems and fault tolerance
  • Mobile Agent-Based Network Management
  • Advanced Database Systems and Queries
  • Auction Theory and Applications
  • Information and Cyber Security
  • Advanced Software Engineering Methodologies
  • Ethics and Social Impacts of AI
  • Distributed and Parallel Computing Systems
  • Topic Modeling
  • Opinion Dynamics and Social Influence
  • Complex Network Analysis Techniques
  • Sentiment Analysis and Opinion Mining
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Game Theory and Applications
  • Network Security and Intrusion Detection
  • Privacy, Security, and Data Protection
  • Software Engineering Research

North Carolina State University
2016-2025

North Central State College
2008-2025

Institute of Electrical and Electronics Engineers
2013-2023

Regional Municipality of Niagara
2013-2023

IEEE Computer Society
2013-2023

Los Alamitos Medical Center
2013-2022

Lancaster University
2020

Delft University of Technology
2020

The Ohio State University
2020

University of Oslo
2020

Traditional approaches to software development - the ones embodied in CASE tools and modeling frameworks are appropriate for building individual components, but they not designed face challenges of open environments. Service-oriented computing provides a way create new architecture that reflects components' trends toward autonomy heterogeneity. We thus emphasize SOC concepts instead how deploy Web services accord with current standards. To begin series, we describe key abstractions elements...

10.1109/mic.2005.21 article EN IEEE Internet Computing 2005-01-01

Blockchain technology offers a sizable promise to rethink the way interorganizational business processes are managed because of its potential realize execution without central party serving as single point trust (and failure). To stimulate research on this and limits thereof, in article, we outline challenges opportunities blockchain for process management (BPM). We first reflect how blockchains could be used context established BPM lifecycle second they might become relevant beyond....

10.1145/3183367 article EN ACM Transactions on Management Information Systems 2018-02-26

Current Web services standards lack the means for expressing a service's nonfunctional attributes - namely, its quality of service. QoS can be objective (encompassing reliability, availability, and request-to-response time) or subjective (focusing on user experience). are key to dynamically selecting that best meet needs. This article addresses dynamic service selection via an agent framework coupled with ontology. With this approach, participants collaborate determine each other's trustworthiness.

10.1109/mic.2004.27 article EN IEEE Internet Computing 2004-09-01

For agents to function effectively in large and open networks, they must ensure that their correspondents, i.e., the interact with, are trustworthy. Since no central authorities may exist, only way can find trustworthy correspondents is by collaborating with others identify those whose past behavior has been untrustworthy. In other words, finding reduces problem of distributed reputation management.Our approach adapts mathematical theory evidence represent propagate ratings give...

10.1145/544805.544809 article EN 2002-01-01

Agent communication languages have been used for years in proprietary multiagent systems. Yet agents from different vendors-or even research projects-cannot communicate with each other. The author looks at the underlying reasons and proposes a conceptual shift individual agent representations to social interaction.

10.1109/2.735849 article EN Computer 1998-01-01

We previously developed a social mechanism for distributed reputation management, in which an agent combines testimonies from several witnesses to determine its ratings of another agent. However, that approach does not fully protect against spurious generated by malicious agents. This paper focuses on the problem deception testimony propagation and aggregation. introduce some models study how efficiently detect deceptive agents following those models. Our involves novel application...

10.1145/860575.860588 article EN 2003-07-14

10.1023/a:1008319631231 article EN Artificial Intelligence and Law 1999-01-01

Emerging Web services standards enable the development of large-scale applications in open environments. In particular, they to be dynamically bound. However, current techniques fail address critical problem selecting right service instances. Service selection should determined based on user preferences and business policies, consider trustworthiness

10.1145/1035167.1035198 article EN 2004-11-15

Protocols represent the allowed interactions among communicating agents. are essential in applications such as electronic commerce where it is necessary to constrain behaviors of autonomous Traditional approaches, which model protocols terms action sequences, limit flexibility agents executing protocols. By contrast, we develop an approach for specifying capture content actions through agents' commitments one another. We formalize a variant event calculus. provide operations and reasoning...

10.1145/544862.544867 article EN 2002-01-01

One of the major challenges for electronic commerce is how to establish a relationship trust between different parties. Establishing nontrivial, because traditional physical or social means cannot apply directly in virtual settings. In many cases, parties involved may not ever have interacted before. Reputation systems seek address development by recording reputations However, most existing reputation are restricted individual market websites. Further, relevant information about party come...

10.1111/1467-8640.00202 article EN Computational Intelligence 2002-11-01

A referral system is a multiagent whose member agents are capable of giving and following referrals. The specific cases interest arise where each agent has user. cooperate by taking referrals so can better help its user locate relevant information. This use mimics human interactions potentially lead to greater effectiveness efficiency than in single-agent systems.Existing approaches consider what may be given treat the referring process simply as path search static graph. By contrast,...

10.1145/860575.860587 article EN 2003-07-14

Current Web services standards enable publishing service descriptions and finding on a match based criteria such as method signatures or category. However, current approaches provide no basis for selecting good comparing ratings of services. We describe conceptual model reputation using which information can be organized shared selection facilitated automated.

10.1145/637411.637417 article EN ACM SIGMOD Record 2002-12-01

In peer-to-peer (P2P) systems, peers often must interact with unknown or unfamiliar without the benefit of trusted third parties authorities to mediate interactions. A peer needs reputation mechanisms incorporate knowledge others decide whether trust another party in P2P systems. This paper discusses design and proposes a distributed mechanism detect malicious unreliable It illustrates process for rating gathering aggregation presents some experimental results evaluate proposed approach....

10.1109/massur.2004.1368412 article EN 2004-12-23

We understand a sociotechnical system as multistakeholder cyber-physical system. introduce governance the administration of such by stakeholders themselves. In this regard, is peer-to-peer notion and contrasts with traditional management, which top-down hierarchical notion. Traditionally, there no computational support for it achieved through out-of-band interactions among administrators. Not surprisingly, approaches simply do not scale up to large systems. develop an approach based on...

10.1145/2542182.2542203 article EN ACM Transactions on Intelligent Systems and Technology 2013-12-01

Defensive deception is a promising approach for cyber defense. Via defensive deception, defender can anticipate and prevent attacks by misleading or luring an attacker, hiding some of its resources. Although garnering increasing research attention, there has not been systematic investigation key components, the underlying principles, tradeoffs in various problem settings. This survey focuses on centered game theory machine learning, since these are prominent families artificial intelligence...

10.1109/comst.2021.3102874 article EN IEEE Communications Surveys & Tutorials 2021-01-01

Today's service-oriented systems realize many ideas from the research conducted a decade or so ago in multiagent systems. Because these two fields are deeply connected, further advances could feed into tomorrow's successful computing approaches. This article describes 15-year roadmap for system research.

10.1109/mic.2005.132 article EN IEEE Internet Computing 2005-11-01
Coming Soon ...