{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:40Z","timestamp":1750308100622,"version":"3.41.0"},"reference-count":8,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2005,5,15]],"date-time":"2005-05-15T00:00:00Z","timestamp":1116115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2005,7]]},"abstract":"<jats:p>Mobile Ad hoc Networks (MANETs) are dynamic environments where frequent changes in the network topology due to physical mobility of hosts result in unpredictable, sporadic and transient connectivity. Due to this high level of uncertainty, only limited guarantees can be given for interactions among agents that run on the mobile hosts. This is not desirable as any interaction among agents on different hosts is susceptible to interruption. In this paper, we explore means to alleviate the level of uncertainty in a MANET by having hosts and agents share knowledge of their non-functional attributes such as location, velocity, etc. with each other. This shared knowledge can be used to compute, for example, the points in space and time when two hosts are likely to be within communication range. This information can then be provided to individual agents, making them more aware of the constraints within which they operate and thereby giving them a chance to tailor their behavior so that they are less affected by unpredictable disconnections. The contributions of this paper are a minimalist formalism for knowledge exchange, a software architecture supporting knowledge exchange, and an empirical evaluation of the benefits of exploiting knowledge to increase the predictability of interactions.<\/jats:p>","DOI":"10.1145\/1082983.1082972","type":"journal-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T19:28:32Z","timestamp":1131391712000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Opportunistic exploitation of knowledge to increase predictability of agent interactions in MANETs"],"prefix":"10.1145","volume":"30","author":[{"given":"Rohan","family":"Sen","sequence":"first","affiliation":[{"name":"Washington University in St. Louis, St. Louis, MO"}]},{"given":"Gregory","family":"Hackmann","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis, St. Louis, MO"}]},{"given":"Gruia-Catalin","family":"Roman","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis, St. Louis, MO"}]},{"given":"Christopher","family":"Gill","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis, St. Louis, MO"}]}],"member":"320","published-online":{"date-parts":[[2005,5,15]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24634-3_12"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016543700801"},{"volume-title":"G. C.: Accommodating Transient Connectivity in Ad Hoc and Mobile Settings. In: Proceedings of The Second International Conference on Pervasive Computing (Pervasive 04)","year":"2004","author":"Handorean R.","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","unstructured":"Microsystems S.: Personal java page. http:\/\/java.sun.com\/products\/personaljava\/index.jsp (2005)  Microsystems S.: Personal java page. http:\/\/java.sun.com\/products\/personaljava\/index.jsp (2005)"},{"volume-title":"Proceedings of the 21st International Conference on Distributed Computing Systems. (2001)","author":"Murphy A.","key":"e_1_2_1_5_1"},{"volume-title":"Mroczkowski","year":"2003","author":"Sultanik E.","key":"e_1_2_1_6_1"},{"volume-title":"Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications. (1999)","author":"Perkins C. E.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.449"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1082983.1082972","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1082983.1082972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:02Z","timestamp":1750262882000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1082983.1082972"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,5,15]]},"references-count":8,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2005,7]]}},"alternative-id":["10.1145\/1082983.1082972"],"URL":"https:\/\/doi.org\/10.1145\/1082983.1082972","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1082960.1082972","asserted-by":"subject"}]},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2005,5,15]]},"assertion":[{"value":"2005-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}