Open AccessDissertation
Designing and trusting multi-agent systems for B2B applications
Reads0
Chats0
TLDR
A trust model allowing agents to evaluate the credibility of other peers in the environment using agents' credibility is proposed, which applies a number of measurements in trust evaluation of other party's likely behavior.Abstract:
This thesis includes two main contributions. The first one is designing and implementing B usiness-to-B usiness (B2B ) applications using multi-agent systems and computational argumentation theory. The second one is trust management in such multi-agent systems using agents' credibility. Our first contribution presents a framework for modeling and deploying B2B applications, with autonomous agents exposing the individual components that implement these applications. This framework consists of three levels identified by strategic, application, and resource, with focus here on the first two levels. The strategic level is about the common vision that independent businesses define as part of their decision of partnership. The application level is about the business processes, which are virtually integrated as result of this common vision. Since conflicts are bound to arise among the independent applications/agents, the framework uses a formal model based upon computational argumentation theory through a persuasion protocol to detect and resolve these conflicts. Termination, soundness, and completeness properties of this protocol are presented. Distributed and centralized coordination strategies are also supported in this framework, which is illustrated with an online purchasing case study followed by its implementation in Jadex, a java-based platform for multi-agent systems. An important issue in such open multi-agent systems is how much agents trust each other. Considering the size of these systems, agents that are service providers or customers in a B2B setting cannot avoid interacting with others that are unknown or partially known regarding to some past experience. Due to the fact that agents are self-interested, they may jeopardize the mutual trust by not performing the actions as they are supposed to. To this end, our second contribution is proposing a trust model allowing agents to evaluate the credibility of other peers in the environment. Our multi-factor model applies a number of measurements in trust evaluation of other party's likely behavior. After a period of time, the actual performance of the testimony agent is compared against the information provided by interfering agents. This comparison process leads to both adjusting the credibility of the contributing agents in trust evaluation and improving the system trust evaluation by minimizing the estimation error.read more
Citations
More filters
Journal Article
Relating protocols for dynamic dispute with logics for defeasible argumentation
TL;DR: In this paper, the authors investigated to what extent protocols for dynamic disputes, i.e., disputes in which the information base can vary at different stages, can be justified in terms of logics for defeasible argumentation.
Dissertation
Sistema de Medida de Confianca para Selecc ¸ ˜ ao de Empresas em Sistemas B2B
Filipe Gabriel,Andrade da Silva +1 more
TL;DR: The designing and specification of a trust and contextual information aggregation model, intended to be a reliable alternative to the trust aggregation models already existing, and trying to set apart from those by including rules to emulate human common sense regarding trust building, and mechanisms to obtain a recommendation grade concerning how likely is a potential partner to perform as the authors desire in the fulfilment of a given contract.
References
More filters
Journal ArticleDOI
Trust management through reputation mechanisms
Giorgos Zacharia,Pattie Maes +1 more
TL;DR: Two complementary reputation mechanisms are investigated which rely on collaborative rating and personalized evaluation of the various ratings assigned to each user which may have applicability in other types of electronic communities such as chatrooms, newsgroups, mailing lists, etc.
Book ChapterDOI
Proof of Theorem 2
TL;DR: The inversion distance is denoted by d(A, B) for signed permutations A and B and the set of all permutations that lie on sorting paths from A to B is written as M A, B,C to denote theSet of inversion medians of three given permutations B, C, and C are written.
Journal ArticleDOI
Multiagent systems engineering
TL;DR: MaSE uses a number of graphically based models to describe system goals, behaviors, agent types, and agent communication interfaces and provides a way to specify architecture-independent detailed definition of the internal agent design.
Journal ArticleDOI
Agent communication languages: the current landscape
Yannis Labrou,Tim Finin,Yun Peng +2 more
TL;DR: Some concepts useful in discussing agent communication languages are introduced and then the two major ACLs are compared and evaluated.
Book
Strategic Negotiation in Multiagent Environments
TL;DR: As computers advance from isolated workstations to linked elements in complex communities of systems and people, cooperation and coordination via intelligent agents become increasingly important.