Difference between revisions of "Volker Literature"
From IridiaWiki
Jump to navigationJump to search(22 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
== Robotics == |
== Robotics == |
||
+ | === PROPOSED (READ) === |
||
<table id="qs_table" border="1"> |
<table id="qs_table" border="1"> |
||
− | <tr><th width="20%">Author</th><th width="30%">Title</th><th width="5%">Year</th><th width="15%">Journal/Proceedings</th><th width="10%">Reftype</th><th width=" |
+ | <tr><th width="20%">Author</th><th width="30%">Title</th><th width="5%">Year</th><th width="15%">Journal/Proceedings</th><th width="10%">Reftype</th><th width="12%">Comment</th><th width="3%">file</th></tr> |
<tr id="BicFagPal2010:ram" class="entry"> |
<tr id="BicFagPal2010:ram" class="entry"> |
||
<td>Bicchi, A., Fagiolini, A. and Pallottino, L.</td> |
<td>Bicchi, A., Fagiolini, A. and Pallottino, L.</td> |
||
Line 11: | Line 12: | ||
<td>article</td> |
<td>article</td> |
||
<td></td> |
<td></td> |
||
− | <td>[[BicFagPal2010ram.pdf|pdf]]</td> |
+ | <td>[[Media:BicFagPal2010ram.pdf|pdf]]</td> |
</tr> |
</tr> |
||
+ | <tr id="ZikLebGur2014:rusmart" class="entry"> |
||
+ | <td>Zikratov, I.A., Lebedev, I.S. and Gurtov, A.V.</td> |
||
+ | <td>Trust and Reputation Mechanisms for Multi-agent Robotic Systems</td> |
||
+ | <td>2014</td> |
||
+ | <td>Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 14th International Conference, NEW2AN 2014 and 7th Conference, ruSMART 2014, St. Petersburg, Russia, August 27-29, 2014. Proceedings, pp. 106-120 </td> |
||
+ | <td>inbook</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:ZikLebGur2014rusmart.pdf|pdf]]</td> |
||
+ | </tr> |
||
+ | </table> |
||
+ | |||
+ | === PROPOSED (SKIMMED) === |
||
+ | |||
+ | <table id="qs_table" border="1"> |
||
+ | <tr><th width="20%">Author</th><th width="30%">Title</th><th width="5%">Year</th><th width="15%">Journal/Proceedings</th><th width="10%">Reftype</th><th width="12%">Comment</th><th width="3%">file</th></tr> |
||
<tr id="BuiGan2014:ecai" class="entry"> |
<tr id="BuiGan2014:ecai" class="entry"> |
||
<td>Buiu, C. and Gânsari, M.</td> |
<td>Buiu, C. and Gânsari, M.</td> |
||
Line 19: | Line 35: | ||
<td>Proc. 6th Int Electronics, Computers and Artificial Intelligence (ECAI) Conf, pp. 5-10 </td> |
<td>Proc. 6th Int Electronics, Computers and Artificial Intelligence (ECAI) Conf, pp. 5-10 </td> |
||
<td>inproceedings</td> |
<td>inproceedings</td> |
||
+ | <td>The authors use P colonies to model interactions in a robot swarm.</td> |
||
− | <td></td> |
||
− | <td>[[BuiGan2014ecai.pdf|pdf]]</td> |
+ | <td>[[Media:BuiGan2014ecai.pdf|pdf]]</td> |
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="SarTom2013:dasc" class="entry"> |
− | <td> |
+ | <td>Sargeant, I. and Tomlinson, A.</td> |
+ | <td>Modelling malicious entities in a robotic swarm</td> |
||
− | <td>Blockchains and Smart Contracts for the Internet of Things</td> |
||
+ | <td>2013</td> |
||
+ | <td>Proc. IEEE/AIAA 32nd Digital Avionics Systems Conf. (DASC), pp. 7B1-1-7B1-12 </td> |
||
+ | <td>inproceedings</td> |
||
+ | <td>The author focuses on security aspects in robot swarms. Might be quite interesting.</td> |
||
+ | <td>[[Media:SarTom2013dasc.pdf|pdf]]</td> |
||
+ | </tr> |
||
+ | <tr id="SarTom2016:escs" class="entry"> |
||
+ | <td>Sargeant, I. and Tomlinson, A.</td> |
||
+ | <td>Maliciously Manipulating a Robotic Swarm</td> |
||
<td>2016</td> |
<td>2016</td> |
||
+ | <td>Proceedings of the Int'l Conf. Embedded Systems, Cyber-physical Systems, & Applications (ESCS'16) </td> |
||
− | <td>IEEE Access<br/>Vol. 4, pp. 2292-2303 </td> |
||
− | <td> |
+ | <td>incollection</td> |
+ | <td>The author focuses on security aspects in robot swarms. Might be quite interesting.</td> |
||
− | <td></td> |
||
− | <td>[[ |
+ | <td>[[Media:SarTom2016escs.pdf|pdf]]</td> |
− | </tr> |
||
− | <tr id="DelArnKos-etal2015:iacr" class="entry"> |
||
− | <td>Kevin Delmolino Mitchell Arnett, A.K.A.M. and Shi, E.</td> |
||
− | <td>Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab.</td> |
||
− | <td>2015</td> |
||
− | <td>IACR Cryptology ePrint Archive, Report 2015/460 </td> |
||
− | <td>techreport</td> |
||
− | <td></td> |
||
− | <td>[[DelArnKos-etal2015iacr.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
</table> |
</table> |
||
− | === PROPOSED === |
+ | === PROPOSED (UNREAD) === |
<table id="qs_table" border="1"> |
<table id="qs_table" border="1"> |
||
− | <tr><th width="20%">Author</th><th width="30%">Title</th><th width="5%">Year</th><th width="15%">Journal/Proceedings</th><th width="10%">Reftype</th><th width=" |
+ | <tr><th width="20%">Author</th><th width="30%">Title</th><th width="5%">Year</th><th width="15%">Journal/Proceedings</th><th width="10%">Reftype</th><th width="12%">Comment</th><th width="3%">file</th></tr> |
<tr id="AzaHorSri-etal2006:wac" class="entry"> |
<tr id="AzaHorSri-etal2006:wac" class="entry"> |
||
<td>Azarnoush, H., Horan, B., Sridhar, P., Madni, A.M. and Jamshidi, M.</td> |
<td>Azarnoush, H., Horan, B., Sridhar, P., Madni, A.M. and Jamshidi, M.</td> |
||
− | <td> |
+ | <td>Towards optimization of a real-world Robotic-Sensor System of Systems</td> |
<td>2006</td> |
<td>2006</td> |
||
<td>Proc. World Automation Congress, pp. 1-8 </td> |
<td>Proc. World Automation Congress, pp. 1-8 </td> |
||
<td>inproceedings</td> |
<td>inproceedings</td> |
||
− | <td></td> |
+ | <td></td> |
+ | <td>[[Media:AzaHorSri-etal2006wac.pdf|pdf]]</td> |
||
− | </tr> |
||
− | <tr id="BicFagPal2010:ram" class="entry"> |
||
− | <td>Bicchi, A., Fagiolini, A. and Pallottino, L.</td> |
||
− | <td>Towards a Society of Robots</td> |
||
− | <td>2010</td> |
||
− | <td>IEEE Robotics Automation Magazine<br/>Vol. 17(4), pp. 26-36 </td> |
||
− | <td>article</td> |
||
− | <td></td> |
||
− | </tr> |
||
− | <tr id="BuiGan2014:ecai" class="entry"> |
||
− | <td>Buiu, C. and Gânsari, M.</td> |
||
− | <td>A new model for interactions between robots in a swarm</td> |
||
− | <td>2014</td> |
||
− | <td>Proc. 6th Int Electronics, Computers and Artificial Intelligence (ECAI) Conf, pp. 5-10 </td> |
||
− | <td>inproceedings</td> |
||
− | <td></td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="LaiNgTomMar2016:inbook" class="entry"> |
<td>Laing, T.M., Ng, S.-L., Tomlinson, A. and Martin, K.M.</td> |
<td>Laing, T.M., Ng, S.-L., Tomlinson, A. and Martin, K.M.</td> |
||
<td>Security in Swarm Robotics</td> |
<td>Security in Swarm Robotics</td> |
||
Line 76: | Line 77: | ||
<td>Handbook of Research on Design, Control, and Modeling of Swarm Robotics, pp. 42-66 </td> |
<td>Handbook of Research on Design, Control, and Modeling of Swarm Robotics, pp. 42-66 </td> |
||
<td>incollection</td> |
<td>incollection</td> |
||
− | <td></td> |
+ | <td></td> |
+ | <td></td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="NouGroBon-etal2009:tec" class="entry"> |
<td>Nouyan, S., Gross, R., Bonani, M., Mondada, F. and Dorigo, M.</td> |
<td>Nouyan, S., Gross, R., Bonani, M., Mondada, F. and Dorigo, M.</td> |
||
<td>Teamwork in Self-Organized Robot Colonies</td> |
<td>Teamwork in Self-Organized Robot Colonies</td> |
||
Line 84: | Line 86: | ||
<td>IEEE Transactions on Evolutionary Computation<br/>Vol. 13(4), pp. 695-711 </td> |
<td>IEEE Transactions on Evolutionary Computation<br/>Vol. 13(4), pp. 695-711 </td> |
||
<td>article</td> |
<td>article</td> |
||
− | <td></td> |
+ | <td></td> |
+ | <td>[[Media:NouGroBon-etal2009tec.pdf|pdf]]</td> |
||
− | </tr> |
||
− | <tr id="SarTom2013:dasc" class="entry"> |
||
− | <td>Sargeant, I. and Tomlinson, A.</td> |
||
− | <td>Modelling malicious entities in a robotic swarm</td> |
||
− | <td>2013</td> |
||
− | <td>Proc. IEEE/AIAA 32nd Digital Avionics Systems Conf. (DASC), pp. 7B1-1-7B1-12 </td> |
||
− | <td>inproceedings</td> |
||
− | <td></td> |
||
− | </tr> |
||
− | <tr id="SarTom2016:escs" class="entry"> |
||
− | <td>Sargeant, I. and Tomlinson, A.</td> |
||
− | <td>Maliciously Manipulating a Robotic Swarm</td> |
||
− | <td>2016</td> |
||
− | <td>Proceedings of the Int'l Conf. Embedded Systems, Cyber-physical Systems, & Applications (ESCS'16) </td> |
||
− | <td>incollection</td> |
||
− | <td></td> |
||
− | </tr> |
||
− | <tr id="ZikLebGur2014:iot" class="entry"> |
||
− | <td>Zikratov, I.A., Lebedev, I.S. and Gurtov, A.V.</td> |
||
− | <td>Trust and Reputation Mechanisms for Multi-agent Robotic Systems</td> |
||
− | <td>2014</td> |
||
− | <td>Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 14th International Conference, NEW2AN 2014 and 7th Conference, ruSMART 2014, St. Petersburg, Russia, August 27-29, 2014. Proceedings, pp. 106-120 </td> |
||
− | <td>inbook</td> |
||
− | <td></td> |
||
</tr> |
</tr> |
||
<tr id="ZikLebGurKuz2014:aict" class="entry"> |
<tr id="ZikLebGurKuz2014:aict" class="entry"> |
||
Line 116: | Line 95: | ||
<td>Proc. IEEE 8th Int Application of Information and Communication Technologies (AICT) Conference, pp. 1-5 </td> |
<td>Proc. IEEE 8th Int Application of Information and Communication Technologies (AICT) Conference, pp. 1-5 </td> |
||
<td>inproceedings</td> |
<td>inproceedings</td> |
||
− | <td></td> |
+ | <td></td> |
+ | <td>[[Media:ZikLebGurKuz2014aict.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="ZikMasLeb-etal2016:rusmart" class="entry"> |
<td>Zikratov, I., Maslennikov, O., Lebedev, I., Ometov, A. and Andreev, S.</td> |
<td>Zikratov, I., Maslennikov, O., Lebedev, I., Ometov, A. and Andreev, S.</td> |
||
<td>Dynamic Trust Management Framework for Robotic Multi-Agent Systems</td> |
<td>Dynamic Trust Management Framework for Robotic Multi-Agent Systems</td> |
||
Line 124: | Line 104: | ||
<td>Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedings, pp. 339-348 </td> |
<td>Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedings, pp. 339-348 </td> |
||
<td>inbook</td> |
<td>inbook</td> |
||
− | <td></td> |
+ | <td></td> |
+ | <td>[[Media:ZikMasLeb-etal2016rusmart.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
</table> |
</table> |
||
− | === READ === |
+ | === READ (FRIA) === |
<table id="qs_table" border="1"> |
<table id="qs_table" border="1"> |
||
− | <tr><th width="20%">Author</th><th width="30%">Title</th><th width="5%">Year</th><th width=" |
+ | <tr><th width="20%">Author</th><th width="30%">Title</th><th width="5%">Year</th><th width="15%">Journal/Proceedings</th><th width="10%">Reftype</th><th width="12%">Comment</th><th width="3%">file</th></tr> |
<tr id="Bay2016:el" class="entry"> |
<tr id="Bay2016:el" class="entry"> |
||
<td>Bayindir, L.</td> |
<td>Bayindir, L.</td> |
||
Line 138: | Line 119: | ||
<td>Neurocomputing<br/>Vol. 172, pp. 292-321 </td> |
<td>Neurocomputing<br/>Vol. 172, pp. 292-321 </td> |
||
<td>article</td> |
<td>article</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:Bay2016neurocomp.pdf|pdf]]</td> |
||
+ | </tr> |
||
+ | <tr id="BonDorThe1999:book" class="entry"> |
||
+ | <td>Bonabeau, E., Dorigo, M. and Theraulaz, G.</td> |
||
+ | <td>Swarm Intelligence: From Natural to Artificial Systems</td> |
||
+ | <td>1999</td> |
||
+ | <td> </td> |
||
+ | <td>book</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:BonDorThe1999book.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="BraBruDorBir2014:acmtaas" class="entry"> |
<td>Brambilla, M., Brutschy, A., Dorigo, M. and Birattari, M.</td> |
<td>Brambilla, M., Brutschy, A., Dorigo, M. and Birattari, M.</td> |
||
<td>Property-driven design for robot swarms: A design method based on prescriptive modeling and model checking</td> |
<td>Property-driven design for robot swarms: A design method based on prescriptive modeling and model checking</td> |
||
− | <td> |
+ | <td>2014</td> |
<td>ACM Transactions on Autonomous and Adaptive Systems<br/>Vol. 9(4), pp. 17:1-17:28 </td> |
<td>ACM Transactions on Autonomous and Adaptive Systems<br/>Vol. 9(4), pp. 17:1-17:28 </td> |
||
<td>article</td> |
<td>article</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:BraBruDorBir2014acmtaas.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
<tr id="BraFerBirDor2013:si" class="entry"> |
<tr id="BraFerBirDor2013:si" class="entry"> |
||
Line 152: | Line 146: | ||
<td>Swarm Intelligence<br/>Vol. 7(1), pp. 1-41 </td> |
<td>Swarm Intelligence<br/>Vol. 7(1), pp. 1-41 </td> |
||
<td>article</td> |
<td>article</td> |
||
+ | <td>The review uses two taxonomies (i) methods and (ii) collective behaviors, to compare swarm robotics research. It was interesting to see that most papers use one of the following techniques: |
||
+ | - probabilistic finite state machine |
||
+ | - virtual physics-based design |
||
+ | - artificial evolution</td> |
||
+ | <td>[[Media:BraFerBirDor2013si.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="DorFloGam-etal2013:ram" class="entry"> |
<td>Dorigo, M., Floreano, D., Gambardella, L.M., Mondada, F., Nolfi, S., Baaboura, T., Birattari, M., Bonani, M., Brambilla, M., Brutschy, A., Burnier, D., Campo, A., Christensen, A.L., Decugniere, A., Caro, G.D., Ducatelle, F., Ferrante, E., Forster, A., Gonzales, J.M., Guzzi, J., Longchamp, V., Magnenat, S., Mathews, N., de Oca, M.M., O'Grady, R., Pinciroli, C., Pini, G., Retornaz, P., Roberts, J., Sperati, V., Stirling, T., Stranieri, A., Stutzle, T., Trianni, V., Tuci, E., Turgut, A.E. and Vaussard, F.</td> |
<td>Dorigo, M., Floreano, D., Gambardella, L.M., Mondada, F., Nolfi, S., Baaboura, T., Birattari, M., Bonani, M., Brambilla, M., Brutschy, A., Burnier, D., Campo, A., Christensen, A.L., Decugniere, A., Caro, G.D., Ducatelle, F., Ferrante, E., Forster, A., Gonzales, J.M., Guzzi, J., Longchamp, V., Magnenat, S., Mathews, N., de Oca, M.M., O'Grady, R., Pinciroli, C., Pini, G., Retornaz, P., Roberts, J., Sperati, V., Stirling, T., Stranieri, A., Stutzle, T., Trianni, V., Tuci, E., Turgut, A.E. and Vaussard, F.</td> |
||
<td>Swarmanoid: A Novel Concept for the Study of Heterogeneous Robotic Swarms</td> |
<td>Swarmanoid: A Novel Concept for the Study of Heterogeneous Robotic Swarms</td> |
||
Line 159: | Line 158: | ||
<td>IEEE Robotics Automation Magazine<br/>Vol. 20(4), pp. 60-71 </td> |
<td>IEEE Robotics Automation Magazine<br/>Vol. 20(4), pp. 60-71 </td> |
||
<td>article</td> |
<td>article</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:DorFloGam-etal2013ram.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="Fer2016:arxiv" class="entry"> |
<td>Ferrer, E.C.</td> |
<td>Ferrer, E.C.</td> |
||
<td>The blockchain: a new framework for robotic swarm systems</td> |
<td>The blockchain: a new framework for robotic swarm systems</td> |
||
Line 166: | Line 167: | ||
<td> </td> |
<td> </td> |
||
<td>article</td> |
<td>article</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:Fer2016arxiv.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="HigTomMar2009:icas" class="entry"> |
<td>Higgins, F., Tomlinson, A. and Martin, K.M.</td> |
<td>Higgins, F., Tomlinson, A. and Martin, K.M.</td> |
||
<td>Survey on Security Challenges for Swarm Robotics</td> |
<td>Survey on Security Challenges for Swarm Robotics</td> |
||
Line 173: | Line 176: | ||
<td>Proc. Fifth Int. Conf. Autonomic and Autonomous Systems, pp. 307-312 </td> |
<td>Proc. Fifth Int. Conf. Autonomic and Autonomous Systems, pp. 307-312 </td> |
||
<td>incollection</td> |
<td>incollection</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:HigTomMar2009icas.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="MasBraLat-etal2013:si" class="entry"> |
<td>Massink, M., Brambilla, M., Latella, D., Dorigo, M. and Birattari, M.</td> |
<td>Massink, M., Brambilla, M., Latella, D., Dorigo, M. and Birattari, M.</td> |
||
<td>On the use of Bio-PEPA for modelling and analysing collective behaviours in swarm robotics</td> |
<td>On the use of Bio-PEPA for modelling and analysing collective behaviours in swarm robotics</td> |
||
Line 180: | Line 185: | ||
<td>Swarm Intelligence<br/>Vol. 7(2-3), pp. 201-228 </td> |
<td>Swarm Intelligence<br/>Vol. 7(2-3), pp. 201-228 </td> |
||
<td>article</td> |
<td>article</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:MasBraLat-etal2013si.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
<tr id="MonPetGui-etal2004:autrob" class="entry"> |
<tr id="MonPetGui-etal2004:autrob" class="entry"> |
||
Line 187: | Line 194: | ||
<td>Autonomous Robots<br/>Vol. 17(2-3), pp. 193-221 </td> |
<td>Autonomous Robots<br/>Vol. 17(2-3), pp. 193-221 </td> |
||
<td>article</td> |
<td>article</td> |
||
− | </ |
+ | <td></td> |
+ | <td>[[Media:MonPetGui-etal2004autrob.pdf|pdf]]</td> |
||
− | <tr id="ReiValFer-etal2015:plosone" class="entry"> |
||
− | <td>Reina, A., Valentini, G., Fernández-Oto, C., Dorigo, M. and Trianni, V.</td> |
||
− | <td>A Design Pattern for Decentralised Decision Making</td> |
||
− | <td>2015</td> |
||
− | <td>PLOS One<br/>Vol. 10(10), pp. 1-18 </td> |
||
− | <td>article</td> |
||
</tr> |
</tr> |
||
<tr id="RubCorNag2014:science" class="entry"> |
<tr id="RubCorNag2014:science" class="entry"> |
||
Line 201: | Line 203: | ||
<td>Science<br/>Vol. 345(6198), pp. 795-799 </td> |
<td>Science<br/>Vol. 345(6198), pp. 795-799 </td> |
||
<td>article</td> |
<td>article</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:RubCorNag2014science.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="ValFerHamDor2016:aamas" class="entry"> |
<td>Valentini, G., Ferrante, E., Hamann, H. and Dorigo, M.</td> |
<td>Valentini, G., Ferrante, E., Hamann, H. and Dorigo, M.</td> |
||
<td>Collective Decision with 100 Kilobots: Speed Versus Accuracy in Binary Discrimination Problems</td> |
<td>Collective Decision with 100 Kilobots: Speed Versus Accuracy in Binary Discrimination Problems</td> |
||
Line 208: | Line 212: | ||
<td>Autonomous Agents and Multi-Agent Systems<br/>Vol. 30(3), pp. 553-580 </td> |
<td>Autonomous Agents and Multi-Agent Systems<br/>Vol. 30(3), pp. 553-580 </td> |
||
<td>article</td> |
<td>article</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:ValFerHamDor2016aamas.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="ZloSteDiaTha2002:icra" class="entry"> |
<td>Zlot, R., Stentz, A., Dias, M.B. and Thayer, S.</td> |
<td>Zlot, R., Stentz, A., Dias, M.B. and Thayer, S.</td> |
||
<td>Multi-robot exploration controlled by a market economy</td> |
<td>Multi-robot exploration controlled by a market economy</td> |
||
Line 215: | Line 221: | ||
<td>Proceedings of the 2002 IEEE International Conference on Robotics and Automation, pp. 3016-3023 </td> |
<td>Proceedings of the 2002 IEEE International Conference on Robotics and Automation, pp. 3016-3023 </td> |
||
<td>incollection</td> |
<td>incollection</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:ZloSteDiaTha2002icra.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
</table> |
</table> |
||
Line 220: | Line 228: | ||
== Blockchain technology == |
== Blockchain technology == |
||
− | === PROPOSED === |
+ | === PROPOSED (READ) === |
+ | <table id="qs_table" border="1"> |
||
+ | <tr><th width="20%">Author</th><th width="30%">Title</th><th width="5%">Year</th><th width="15%">Journal/Proceedings</th><th width="10%">Reftype</th><th width="12%">Comment</th><th width="3%">file</th></tr> |
||
+ | <tr id="ChrDev2016:access" class="entry"> |
||
+ | <td>Christidis, K. and Devetsikiotis, M.</td> |
||
+ | <td>Blockchains and Smart Contracts for the Internet of Things</td> |
||
+ | <td>2016</td> |
||
+ | <td>IEEE Access<br/>Vol. 4, pp. 2292-2303 </td> |
||
+ | <td>article</td> |
||
+ | <td>The papers gives a very good overview of the state of the art of blockchain technology (PoW/PoS, smart contracts, ...). It does not deal that much with The Internet of Things domain. There are just some possible applications, such as firmware update and workflow automation.</td> |
||
+ | <td>[[Media:ChrDev2016access.pdf|pdf]]</td> |
||
+ | </tr> |
||
+ | <tr id="DelArnKos-etal2015:iacr" class="entry"> |
||
+ | <td>Kevin Delmolino Mitchell Arnett, A.K.A.M. and Shi, E.</td> |
||
+ | <td>Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab.</td> |
||
+ | <td>2015</td> |
||
+ | <td>IACR Cryptology ePrint Archive, Report 2015/460 </td> |
||
+ | <td>techreport</td> |
||
+ | <td>The paper describes some experiences of the authors teaching to program smart contracts to students. The authors use Serpent and descreibed possible pitfalls based on one scenario.</td> |
||
+ | <td>[[Media:DelArnKos-etal2015iacr.pdf|pdf]]</td> |
||
+ | </tr> |
||
+ | <tr id="LuuChuOli2016:iacr" class="entry"> |
||
+ | <td>Luu, L., Chu, D.-H., Olickel, H., Saxena, P. and Hobor, A.</td> |
||
+ | <td>Making smart contracts smarter</td> |
||
+ | <td>2016</td> |
||
+ | <td><i>School</i>: Cryptology ePrint Archive, Report 2016/633, 201 6. http://eprint. iacr. org/2016/633 </td> |
||
+ | <td>techreport</td> |
||
+ | <td>Discusses security issues in smart contracts and presents Oyente, a tool for finding security bugs.</td> |
||
+ | <td>[[Media:LuuChuOli2016iacr.pdf|pdf]]</td> |
||
+ | </tr> |
||
+ | </table> |
||
+ | |||
+ | === PROPOSED (SKIMMED) === |
||
<table id="qs_table" border="1"> |
<table id="qs_table" border="1"> |
||
Line 232: | Line 272: | ||
<td>article</td> |
<td>article</td> |
||
<td></td> |
<td></td> |
||
− | <td>[[Atz2016ssrn.pdf|pdf]]</td> |
||
− | </tr> |
||
− | <tr id="ChrDev2016:access" class="entry"> |
||
− | <td>Christidis, K. and Devetsikiotis, M.</td> |
||
− | <td>Blockchains and Smart Contracts for the Internet of Things</td> |
||
− | <td>2016</td> |
||
− | <td>IEEE Access<br/>Vol. 4, pp. 2292-2303 </td> |
||
− | <td>article</td> |
||
− | <td></td> |
||
− | <td>[[ChrDev2016access.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
<tr id="DorKanJur2016:arxiv" class="entry"> |
<tr id="DorKanJur2016:arxiv" class="entry"> |
||
Line 249: | Line 279: | ||
<td>pre-print </td> |
<td>pre-print </td> |
||
<td>article</td> |
<td>article</td> |
||
+ | <td>The authors describe possible applications for smart homes using "overlay networks." At first sight, the setup seems to be a bit too complicated since the blockchain is not really needed for the described application (only trusted devices, and so on) but I should read the paper again.</td> |
||
− | <td></td> |
||
− | <td>[[DorKanJur2016arxiv.pdf|pdf]]</td> |
+ | <td>[[Media:DorKanJur2016arxiv.pdf|pdf]]</td> |
− | </tr> |
||
− | <tr id="DelArnKos-etal2015:iacr" class="entry"> |
||
− | <td>Kevin Delmolino Mitchell Arnett, A.K.A.M. and Shi, E.</td> |
||
− | <td>Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab.</td> |
||
− | <td>2015</td> |
||
− | <td>IACR Cryptology ePrint Archive, Report 2015/460 </td> |
||
− | <td>techreport</td> |
||
− | <td></td> |
||
− | <td>[[DelArnKos-etal2015iacr.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
+ | </table> |
||
+ | |||
+ | === PROPOSED (UNREAD) === |
||
+ | |||
+ | <table id="qs_table" border="1"> |
||
+ | <tr><th width="20%">Author</th><th width="30%">Title</th><th width="5%">Year</th><th width="15%">Journal/Proceedings</th><th width="10%">Reftype</th><th width="12%">Comment</th><th width="3%">file</th></tr> |
||
<tr id="LeiMemHog2016:ubicomp" class="entry"> |
<tr id="LeiMemHog2016:ubicomp" class="entry"> |
||
<td>Leiding, B., Memarmoshrefi, P. and Hogrefe, D.</td> |
<td>Leiding, B., Memarmoshrefi, P. and Hogrefe, D.</td> |
||
Line 267: | Line 294: | ||
<td>Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, pp. 137-140 </td> |
<td>Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, pp. 137-140 </td> |
||
<td>inproceedings</td> |
<td>inproceedings</td> |
||
+ | <td>I should read the paper again. It's quite short (3 pages) and I think it mainly describes a scenario for automated payments for cars.</td> |
||
− | <td></td> |
||
− | <td>[[LeiMemHog2016ubicomp.pdf|pdf]]</td> |
+ | <td>[[Media:LeiMemHog2016ubicomp.pdf|pdf]]</td> |
− | </tr> |
||
− | <tr id="LuuChuOli2016:iacr" class="entry"> |
||
− | <td>Luu, L., Chu, D.-H., Olickel, H., Saxena, P. and Hobor, A.</td> |
||
− | <td>Making smart contracts smarter</td> |
||
− | <td>2016</td> |
||
− | <td><i>School</i>: Cryptology ePrint Archive, Report 2016/633, 201 6. http://eprint. iacr. org/2016/633 </td> |
||
− | <td>techreport</td> |
||
− | <td>Discusses security issues in smart contracts and presents Oyente, a tool for finding security bugs.</td> |
||
− | <td>[[LuuChuOli2016iacr.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
</table> |
</table> |
||
− | === READ === |
+ | === READ (FRIA) === |
+ | |||
<table id="qs_table" border="1"> |
<table id="qs_table" border="1"> |
||
− | <tr><th width="20%">Author</th><th width="30%">Title</th><th width="5%">Year</th><th width=" |
+ | <tr><th width="20%">Author</th><th width="30%">Title</th><th width="5%">Year</th><th width="15%">Journal/Proceedings</th><th width="10%">Reftype</th><th width="12%">Comment</th><th width="3%">file</th></tr> |
<tr id="But2014:online" class="entry"> |
<tr id="But2014:online" class="entry"> |
||
<td>Buterin, V.</td> |
<td>Buterin, V.</td> |
||
Line 291: | Line 310: | ||
<td> </td> |
<td> </td> |
||
<td>techreport</td> |
<td>techreport</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:But2014techreport.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="Fer2016:arxiv" class="entry"> |
<td>Ferrer, E.C.</td> |
<td>Ferrer, E.C.</td> |
||
<td>The blockchain: a new framework for robotic swarm systems</td> |
<td>The blockchain: a new framework for robotic swarm systems</td> |
||
Line 298: | Line 319: | ||
<td> </td> |
<td> </td> |
||
<td>article</td> |
<td>article</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:Fer2016arxiv.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
− | <tr id="Nak2008: |
+ | <tr id="Nak2008:techreport" class="entry"> |
<td>Nakamoto, S.</td> |
<td>Nakamoto, S.</td> |
||
<td>Bitcoin: A peer-to-peer electronic cash system</td> |
<td>Bitcoin: A peer-to-peer electronic cash system</td> |
||
Line 305: | Line 328: | ||
<td> </td> |
<td> </td> |
||
<td>techreport</td> |
<td>techreport</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:Nak2008techreport.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="Sza1997:techreport" class="entry"> |
<td>Szabo, N.</td> |
<td>Szabo, N.</td> |
||
<td>Formalizing and securing relationships on public networks</td> |
<td>Formalizing and securing relationships on public networks</td> |
||
Line 312: | Line 337: | ||
<td>First Monday<br/>Vol. 2(9) </td> |
<td>First Monday<br/>Vol. 2(9) </td> |
||
<td>techreport</td> |
<td>techreport</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:Sza1997techreport.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="Woo2014:techreport" class="entry"> |
<td>Wood, G.</td> |
<td>Wood, G.</td> |
||
<td>Ethereum: A secure decentralised generalised transaction ledger</td> |
<td>Ethereum: A secure decentralised generalised transaction ledger</td> |
||
Line 319: | Line 346: | ||
<td>Ethereum Project Yellow Paper </td> |
<td>Ethereum Project Yellow Paper </td> |
||
<td>techreport</td> |
<td>techreport</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:Woo2014techreport.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
</table> |
</table> |
||
Line 324: | Line 353: | ||
== Others == |
== Others == |
||
− | === PROPOSED === |
+ | === PROPOSED (UNERAD) === |
+ | |||
<table id="qs_table" border="1"> |
<table id="qs_table" border="1"> |
||
Line 335: | Line 365: | ||
<td>book</td> |
<td>book</td> |
||
<td></td> |
<td></td> |
||
− | <td>[[ButHub2007book.pdf|pdf]]</td> |
+ | <td>[[Media:ButHub2007book.pdf|pdf]]</td> |
</tr> |
</tr> |
||
<tr id="BeaRen2007:book" class="entry"> |
<tr id="BeaRen2007:book" class="entry"> |
||
Line 344: | Line 374: | ||
<td>book</td> |
<td>book</td> |
||
<td></td> |
<td></td> |
||
− | <td> |
+ | <td></td> |
</tr> |
</tr> |
||
</table> |
</table> |
||
− | === READ === |
+ | === READ (FRIA) === |
<table id="qs_table" border="1"> |
<table id="qs_table" border="1"> |
||
− | <tr><th width="20%">Author</th><th width="30%">Title</th><th width="5%">Year</th><th width=" |
+ | <tr><th width="20%">Author</th><th width="30%">Title</th><th width="5%">Year</th><th width="15%">Journal/Proceedings</th><th width="10%">Reftype</th><th width="12%">Comment</th><th width="3%">file</th></tr> |
<tr id="Con2010:annmai" class="entry"> |
<tr id="Con2010:annmai" class="entry"> |
||
<td>Conitzer, V.</td> |
<td>Conitzer, V.</td> |
||
Line 358: | Line 388: | ||
<td>Annals of Mathematics and Artificial Intelligence<br/>Vol. 58(3-4), pp. 239-259 </td> |
<td>Annals of Mathematics and Artificial Intelligence<br/>Vol. 58(3-4), pp. 239-259 </td> |
||
<td>article</td> |
<td>article</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:Con2010annmai.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="ParWoo2002:aamas" class="entry"> |
<td>Parsons, S. and Wooldridge, M.</td> |
<td>Parsons, S. and Wooldridge, M.</td> |
||
<td>Game Theory and Decision Theory in Multi-Agent Systems</td> |
<td>Game Theory and Decision Theory in Multi-Agent Systems</td> |
||
Line 365: | Line 397: | ||
<td>Autonomous Agents and Multi-Agent Systems<br/>Vol. 5(3), pp. 243-254 </td> |
<td>Autonomous Agents and Multi-Agent Systems<br/>Vol. 5(3), pp. 243-254 </td> |
||
<td>article</td> |
<td>article</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:ParWoo2002aamas.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
− | <tr id=" |
+ | <tr id="PezBabChe-etal2013:ejor" class="entry"> |
<td>Pezeshki, Y., Baboli, A., Cheikhrouhou, N., Modarres, M. and Jokar, M.R.A.</td> |
<td>Pezeshki, Y., Baboli, A., Cheikhrouhou, N., Modarres, M. and Jokar, M.R.A.</td> |
||
<td>A rewarding-punishing coordination mechanism based on Trust in a divergent supply chain</td> |
<td>A rewarding-punishing coordination mechanism based on Trust in a divergent supply chain</td> |
||
Line 372: | Line 406: | ||
<td>European Journal of Operational Research<br/>Vol. 230(3), pp. 527-538 </td> |
<td>European Journal of Operational Research<br/>Vol. 230(3), pp. 527-538 </td> |
||
<td>article</td> |
<td>article</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:PezBabChe-etal2013ejor.pdf|pdf]]</td> |
||
+ | </tr> |
||
+ | <tr id="WooWo2001:book" class="entry"> |
||
+ | <td>Woolridge, M. and Wooldridge, M.J.</td> |
||
+ | <td>An Introduction to Multiagent Systems - Second Edition</td> |
||
+ | <td>2001</td> |
||
+ | <td> </td> |
||
+ | <td>book</td> |
||
+ | <td></td> |
||
+ | <td>[[Media:WooWoo2001book.pdf|pdf]]</td> |
||
</tr> |
</tr> |
||
</table> |
</table> |
Latest revision as of 12:18, 6 October 2018
Robotics
PROPOSED (READ)
Author | Title | Year | Journal/Proceedings | Reftype | Comment | file |
---|---|---|---|---|---|---|
Bicchi, A., Fagiolini, A. and Pallottino, L. | Towards a Society of Robots | 2010 | IEEE Robotics Automation Magazine Vol. 17(4), pp. 26-36 |
article | ||
Zikratov, I.A., Lebedev, I.S. and Gurtov, A.V. | Trust and Reputation Mechanisms for Multi-agent Robotic Systems | 2014 | Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 14th International Conference, NEW2AN 2014 and 7th Conference, ruSMART 2014, St. Petersburg, Russia, August 27-29, 2014. Proceedings, pp. 106-120 | inbook |
PROPOSED (SKIMMED)
Author | Title | Year | Journal/Proceedings | Reftype | Comment | file |
---|---|---|---|---|---|---|
Buiu, C. and Gânsari, M. | A new model for interactions between robots in a swarm | 2014 | Proc. 6th Int Electronics, Computers and Artificial Intelligence (ECAI) Conf, pp. 5-10 | inproceedings | The authors use P colonies to model interactions in a robot swarm. | |
Sargeant, I. and Tomlinson, A. | Modelling malicious entities in a robotic swarm | 2013 | Proc. IEEE/AIAA 32nd Digital Avionics Systems Conf. (DASC), pp. 7B1-1-7B1-12 | inproceedings | The author focuses on security aspects in robot swarms. Might be quite interesting. | |
Sargeant, I. and Tomlinson, A. | Maliciously Manipulating a Robotic Swarm | 2016 | Proceedings of the Int'l Conf. Embedded Systems, Cyber-physical Systems, & Applications (ESCS'16) | incollection | The author focuses on security aspects in robot swarms. Might be quite interesting. |
PROPOSED (UNREAD)
Author | Title | Year | Journal/Proceedings | Reftype | Comment | file |
---|---|---|---|---|---|---|
Azarnoush, H., Horan, B., Sridhar, P., Madni, A.M. and Jamshidi, M. | Towards optimization of a real-world Robotic-Sensor System of Systems | 2006 | Proc. World Automation Congress, pp. 1-8 | inproceedings | ||
Laing, T.M., Ng, S.-L., Tomlinson, A. and Martin, K.M. | Security in Swarm Robotics | 2016 | Handbook of Research on Design, Control, and Modeling of Swarm Robotics, pp. 42-66 | incollection | ||
Nouyan, S., Gross, R., Bonani, M., Mondada, F. and Dorigo, M. | Teamwork in Self-Organized Robot Colonies | 2009 | IEEE Transactions on Evolutionary Computation Vol. 13(4), pp. 695-711 |
article | ||
Zikratov, I.A., Lebedev, I.S., Gurtov, A.V. and Kuzmich, E.V. | Securing swarm intellect robots with a police office model | 2014 | Proc. IEEE 8th Int Application of Information and Communication Technologies (AICT) Conference, pp. 1-5 | inproceedings | ||
Zikratov, I., Maslennikov, O., Lebedev, I., Ometov, A. and Andreev, S. | Dynamic Trust Management Framework for Robotic Multi-Agent Systems | 2016 | Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedings, pp. 339-348 | inbook |
READ (FRIA)
Author | Title | Year | Journal/Proceedings | Reftype | Comment | file |
---|---|---|---|---|---|---|
Bayindir, L. | A review of swarm robotics tasks | 2016 | Neurocomputing Vol. 172, pp. 292-321 |
article | ||
Bonabeau, E., Dorigo, M. and Theraulaz, G. | Swarm Intelligence: From Natural to Artificial Systems | 1999 | book | |||
Brambilla, M., Brutschy, A., Dorigo, M. and Birattari, M. | Property-driven design for robot swarms: A design method based on prescriptive modeling and model checking | 2014 | ACM Transactions on Autonomous and Adaptive Systems Vol. 9(4), pp. 17:1-17:28 |
article | ||
Brambilla, M., Ferrante, E., Birattari, M. and Dorigo, M. | Swarm robotics: A Review from the Swarm Engineering Perspective | 2013 | Swarm Intelligence Vol. 7(1), pp. 1-41 |
article | The review uses two taxonomies (i) methods and (ii) collective behaviors, to compare swarm robotics research. It was interesting to see that most papers use one of the following techniques:
- probabilistic finite state machine - virtual physics-based design - artificial evolution |
|
Dorigo, M., Floreano, D., Gambardella, L.M., Mondada, F., Nolfi, S., Baaboura, T., Birattari, M., Bonani, M., Brambilla, M., Brutschy, A., Burnier, D., Campo, A., Christensen, A.L., Decugniere, A., Caro, G.D., Ducatelle, F., Ferrante, E., Forster, A., Gonzales, J.M., Guzzi, J., Longchamp, V., Magnenat, S., Mathews, N., de Oca, M.M., O'Grady, R., Pinciroli, C., Pini, G., Retornaz, P., Roberts, J., Sperati, V., Stirling, T., Stranieri, A., Stutzle, T., Trianni, V., Tuci, E., Turgut, A.E. and Vaussard, F. | Swarmanoid: A Novel Concept for the Study of Heterogeneous Robotic Swarms | 2013 | IEEE Robotics Automation Magazine Vol. 20(4), pp. 60-71 |
article | ||
Ferrer, E.C. | The blockchain: a new framework for robotic swarm systems | 2016 | article | |||
Higgins, F., Tomlinson, A. and Martin, K.M. | Survey on Security Challenges for Swarm Robotics | 2009 | Proc. Fifth Int. Conf. Autonomic and Autonomous Systems, pp. 307-312 | incollection | ||
Massink, M., Brambilla, M., Latella, D., Dorigo, M. and Birattari, M. | On the use of Bio-PEPA for modelling and analysing collective behaviours in swarm robotics | 2013 | Swarm Intelligence Vol. 7(2-3), pp. 201-228 |
article | ||
Mondada, F., Pettinaro, G.C., Guignard, A., Kwee, I.W., Floreano, D., Deneubourg, J.-L., Nolfi, S., Gambardella, L.M. and Dorigo, M. | Swarm-Bot: A New Distributed Robotic Concept | 2004 | Autonomous Robots Vol. 17(2-3), pp. 193-221 |
article | ||
Rubenstein, M., Cornejo, A. and Nagpal, R. | Programmable self-assembly in a thousand-robot swarm | 2014 | Science Vol. 345(6198), pp. 795-799 |
article | ||
Valentini, G., Ferrante, E., Hamann, H. and Dorigo, M. | Collective Decision with 100 Kilobots: Speed Versus Accuracy in Binary Discrimination Problems | 2016 | Autonomous Agents and Multi-Agent Systems Vol. 30(3), pp. 553-580 |
article | ||
Zlot, R., Stentz, A., Dias, M.B. and Thayer, S. | Multi-robot exploration controlled by a market economy | 2002 | Proceedings of the 2002 IEEE International Conference on Robotics and Automation, pp. 3016-3023 | incollection |
Blockchain technology
PROPOSED (READ)
Author | Title | Year | Journal/Proceedings | Reftype | Comment | file |
---|---|---|---|---|---|---|
Christidis, K. and Devetsikiotis, M. | Blockchains and Smart Contracts for the Internet of Things | 2016 | IEEE Access Vol. 4, pp. 2292-2303 |
article | The papers gives a very good overview of the state of the art of blockchain technology (PoW/PoS, smart contracts, ...). It does not deal that much with The Internet of Things domain. There are just some possible applications, such as firmware update and workflow automation. | |
Kevin Delmolino Mitchell Arnett, A.K.A.M. and Shi, E. | Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab. | 2015 | IACR Cryptology ePrint Archive, Report 2015/460 | techreport | The paper describes some experiences of the authors teaching to program smart contracts to students. The authors use Serpent and descreibed possible pitfalls based on one scenario. | |
Luu, L., Chu, D.-H., Olickel, H., Saxena, P. and Hobor, A. | Making smart contracts smarter | 2016 | School: Cryptology ePrint Archive, Report 2016/633, 201 6. http://eprint. iacr. org/2016/633 | techreport | Discusses security issues in smart contracts and presents Oyente, a tool for finding security bugs. |
PROPOSED (SKIMMED)
Author | Title | Year | Journal/Proceedings | Reftype | Comment | file |
---|---|---|---|---|---|---|
Atzori, M. | Blockchain-Based Architectures for the Internet of Things: A Survey. | 2016 | Available at SSRN | article | ||
Dorri, A., Kanhere, S.S. and Jurdak, R. | Blockchain in internet of things: Challenges and Solutions | 2016 | pre-print | article | The authors describe possible applications for smart homes using "overlay networks." At first sight, the setup seems to be a bit too complicated since the blockchain is not really needed for the described application (only trusted devices, and so on) but I should read the paper again. |
PROPOSED (UNREAD)
Author | Title | Year | Journal/Proceedings | Reftype | Comment | file |
---|---|---|---|---|---|---|
Leiding, B., Memarmoshrefi, P. and Hogrefe, D. | Self-managed and Blockchain-based Vehicular Ad-hoc Networks | 2016 | Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, pp. 137-140 | inproceedings | I should read the paper again. It's quite short (3 pages) and I think it mainly describes a scenario for automated payments for cars. |
READ (FRIA)
Author | Title | Year | Journal/Proceedings | Reftype | Comment | file |
---|---|---|---|---|---|---|
Buterin, V. | Ethereum: A next-generation smart contract and decentralized application platform | 2014 | techreport | |||
Ferrer, E.C. | The blockchain: a new framework for robotic swarm systems | 2016 | article | |||
Nakamoto, S. | Bitcoin: A peer-to-peer electronic cash system | 2008 | techreport | |||
Szabo, N. | Formalizing and securing relationships on public networks | 1997 | First Monday Vol. 2(9) |
techreport | ||
Wood, G. | Ethereum: A secure decentralised generalised transaction ledger | 2014 | Ethereum Project Yellow Paper | techreport |
Others
PROPOSED (UNERAD)
Author | Title | Year | Journal/Proceedings | Reftype | Comment | file |
---|---|---|---|---|---|---|
Levente Buttyan, J.-P.H. | Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing | 2007 | book | |||
Randal Beard, W.R. | Distributed Consensus in Multi-vehicle Cooperative Control | 2007 | book |
READ (FRIA)
Author | Title | Year | Journal/Proceedings | Reftype | Comment | file |
---|---|---|---|---|---|---|
Conitzer, V. | Comparing Multiagent Systems Research in Combinatorial Auctions and Voting | 2010 | Annals of Mathematics and Artificial Intelligence Vol. 58(3-4), pp. 239-259 |
article | ||
Parsons, S. and Wooldridge, M. | Game Theory and Decision Theory in Multi-Agent Systems | 2002 | Autonomous Agents and Multi-Agent Systems Vol. 5(3), pp. 243-254 |
article | ||
Pezeshki, Y., Baboli, A., Cheikhrouhou, N., Modarres, M. and Jokar, M.R.A. | A rewarding-punishing coordination mechanism based on Trust in a divergent supply chain | 2013 | European Journal of Operational Research Vol. 230(3), pp. 527-538 |
article | ||
Woolridge, M. and Wooldridge, M.J. | An Introduction to Multiagent Systems - Second Edition | 2001 | book |