|Appears in Collections:||Computing Science and Mathematics Journal Articles|
|Peer Review Status:||Refereed|
|Title:||Agent-based tools for modeling and simulation of self-organization in peer-to-peer, ad hoc, and other complex networks|
|Authors:||Niazi, Muaz A K|
Wireless Sensor Network
|Publisher:||IEEE (Institute of Electrical and Electronics Engineers)|
|Citation:||Niazi MAK & Hussain A (2009) Agent-based tools for modeling and simulation of self-organization in peer-to-peer, ad hoc, and other complex networks, IEEE Communications Magazine, 47 (3), pp. 166-173.|
|Abstract:||Agent-based modeling and simulation tools provide a mature platform for development of complex simulations. They however, have not been applied much in the domain of mainstream modeling and simulation of computer networks. In this article, we evaluate how and if these tools can offer any value-addition in the modeling & simulation of complex networks such as pervasive computing, large-scale peer-to-peer systems, and networks involving considerable environment and human/animal/habitat interaction. Specifically, we demonstrate the effectiveness of NetLogo — a tool that has been widely used in the area of agent-based social simulation.|
|Rights:||Niazi, M.; Hussain, A.; , "Agent-based tools for modeling and simulation of self-organization in peer-to-peer, ad hoc, and other complex networks," Communications Magazine, IEEE , vol.47, no.3, pp.166-173, March 2009 doi: 10.1109/MCOM.2009.4804403 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4804403&isnumber=4804371; Published in IEEE Communications Magazine. Copyright: IEEE (Institute of Electrical and Electronics Engineers).; ©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.|
|Affiliation:||University of Stirling|
Computing Science - CSM Dept
This item is protected by original copyright
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
If you believe that any material held in STORRE infringes copyright, please contact firstname.lastname@example.org providing details and we will remove the Work from public display in STORRE and investigate your claim.