Learn More
Iron supply has a key role in stimulating phytoplankton blooms in high-nitrate low-chlorophyll oceanic waters. However, the fate of the carbon fixed by these blooms, and how efficiently it is exported into the ocean's interior, remains largely unknown. Here we report on the decline and fate of an iron-stimulated diatom bloom in the Gulf of Alaska. The bloom(More)
This paper examines the security aspects of different pervasive scenarios involving agent communities evolved using multi agent systems (MAS). It describes the motivation and the objectives behind the development of these agent communities and analyses the security vulnerabilities, which arise within them. To counter these vulnerabilities, the paper(More)
UNU-WIDER gratefully acknowledges specific programme contributions from the governments of Denmark (Ministry of Foreign Affairs, Danida) and Sweden (Swedish International Development Cooperation Agency—Sida) for the Research and Communication (ReCom) programme. UNU-WIDER also acknowledges core financial support to UNU-WIDER's work programme from the(More)
The project SoDa (solar data) answers the needs of industry and research for information on solar radiation parameters with a satisfactory quality. The methodology is user-driven with a large involvement of users in the project, who gauge the progresses and achievements. A prototype servicehas been developed, using Internet
There are a range of UV models available, but one needs significant pre-existing knowledge and experience in order to be able to use them. In this article a comparatively simple Web-based model developed for the SoDa (Integration and Exploitation of Networked Solar Radiation Databases for Environment Monitoring) project is presented. This is a clear-sky(More)
This paper exposes different security threats posed to information in software agent systems. It describes various scenarios in which security can be compromised and highlights the requirements of a standard security-testing environment. This environment is generated using a Security Analysis Tool (SAT) proposed and described in this paper. The tool also(More)
The paper describes the evolution and implementation of a self-executing security examination (SENSE) for agents executing in non-trusted domains. It outlines the shortcomings of some of the existing agent security schemas. To meet these shortcomings, the paper proposes the implementation of SENSE as a reliable method for detecting a malicious action(More)