Run-Time Agents as a Means of Reconciling Flexibility and Scalability of Services

  • Tiziana Margaria
  • Bernhard Steffen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3825)


In this paper, we present our approach to flexibly modelling user processes: lightweight run time agents. These agents can be thought of as essentially being ‘session handlers’ with persistent memory, which steer the execution of generic global services according to the users’ profile and its current context and goals. We illustrate this paradigm in two application scenarios, the Online Conference Service, and MaTRICS, a remote configuration management environment.


Model Check Access Control Model Intelligent Network User Client Coordination Graph 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ahmed, T., Tripathi, A.: Static Verification of Security Requirements in Role Based CSCW Systems. In: Proc. 8th Symp. on Access Control Models and Technologies, Como (I), pp. 196–203. ACM Press, New York (2003)Google Scholar
  2. 2.
    Bajohr, M., Margaria, T.: MaTRICS: A Management Tool for Remote Intelligent Configuration of (Pervasive) Systems. In: Proc. ICPS 2005, IEEE Int. Conference on Pervasive Services, Santorini, Greece, July 11-14, 2005. IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  3. 3.
    Franklin, S., Graesser, A.: Is it an Agent, or just a Program?: A Taxonomy for Autonomous Agents. In: Proc. 3rd Int. Worksh. on Agent Theories, Architectures, and Languages. Springer, Heidelberg (1996), Google Scholar
  4. 4.
    ITU: General recommendations on telephone switching and signaling intelligent network: Introduction to intelligent network capability set 1, Recommendation Q.1211, Telecommunication Standardization Sector of ITU, Geneva (March1993)Google Scholar
  5. 5.
    ITU-T: Recommendation Q.1203. Intelligent Network - Global Functional Plane Architecture (October 1992)Google Scholar
  6. 6.
    Karusseit, M., Margaria, T.: Feature-based Modelling of a Complex, Online- Reconfigurable Decision Support Service. In: WWV 2005 1st Int’l Workshop on Automated Specification and Verification of Web Sites, Valencia, Spain, March 14-15 (2005); Post Workshop Proc. appear in ENTCSGoogle Scholar
  7. 7.
    Lindner, B., Margaria, T., Steffen, B.: Ein personalisierter Internetdienst fr wissenschaftliche Begutachtungsprozesse, GI-VOI-BITKOM-OCG-TeleTrusT Konferenz Elektronische Geschäfts-prozesse (eBusiness Processes), September 2001. Universität Klagenfurt (2001),
  8. 8.
    Margaria, T.: Components, Features, and Agents in the ABC. In: Ryan, M.D., Meyer, J.-J.C., Ehrich, H.-D. (eds.) Objects, Agents, and Features. LNCS, vol. 2975, pp. 154–174. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Margaria, T., Karusseit, M.: Community Usage of the Online Conference Service: an Experience Report from three CS Conferences, 2nd IFIP Conf. on e-commerce, ebusiness, e-government (I3E 2002), Lisboa (P), October 2002. Towards the Knowledge Society, pp. 497–511. Kluwer, Dordrecht (2002)Google Scholar
  10. 10.
    Margaria, T., Nagel, R., Steffen, B.: Remote Integration and Coordination of Verification Tools in jETI. In: Proc. ECBS 2005, 12th IEEE Int. Conf. on the Engineering of Computer Based Systems, Greenbelt, USA (April 2005)Google Scholar
  11. 11.
    Margaria, T., Steffen, B.: Lightweight Coarse-grained Coordination: A Scalable System-Level Approach, in STTT. Special Section on Formal Methods in Industrial Critical Systems of the Int. Journal on Software Tools for Technology Transfer 5(2-3), 107–123 (2004)CrossRefGoogle Scholar
  12. 12.
    Müller-Olm, M., Schmidt, D., Steffen, B.: Model-Checking: A Tutorial Introduction. In: SAS 1998. LNCS, vol. 1503, pp. 330–354. Springer, Heidelberg (1999)Google Scholar
  13. 13.
    Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)CrossRefGoogle Scholar
  14. 14.
    Steffen, B., Claßen, A., Klein, M., Knoop, J., Margaria, T.: The Fixpoint Analysis Machine. In: Lee, I., Smolka, S.A. (eds.) CONCUR 1995. LNCS, vol. 962. Springer, Heidelberg (1995)Google Scholar
  15. 15.
    Steffen, B., Margaria, T.: METAFrame in Practice: Intelligent Network Service Design. In: Olderog, E.-R., Steffen, B. (eds.) Correct System Design. LNCS, vol. 1710, pp. 390–415. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  16. 16.
    Steffen, B., Margaria, T., Braun, V., Kalt, N.: Hierarchical service definition, Annual Review of Communication. Int. Engin. Consortium (IEC), 847–856 (1997)Google Scholar
  17. 17.
    Weber, H.: Continuous Engineering of Information and Communication Infrastructures. In: Finance, J.-P. (ed.) FASE 1999. LNCS, vol. 1577, pp. 22–29. Springer, Heidelberg (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Tiziana Margaria
    • 1
  • Bernhard Steffen
    • 2
  1. 1.Universität GöttingenGöttingenGermany
  2. 2.Universität DortmundDortmundGermany

Personalised recommendations