scispace - formally typeset
Open AccessDissertation

Designing and trusting multi-agent systems for B2B applications

Rafiul Alam
Reads0
Chats0
TLDR
A trust model allowing agents to evaluate the credibility of other peers in the environment using agents' credibility is proposed, which applies a number of measurements in trust evaluation of other party's likely behavior.
Abstract
This thesis includes two main contributions. The first one is designing and implementing B usiness-to-B usiness (B2B ) applications using multi-agent systems and computational argumentation theory. The second one is trust management in such multi-agent systems using agents' credibility. Our first contribution presents a framework for modeling and deploying B2B applications, with autonomous agents exposing the individual components that implement these applications. This framework consists of three levels identified by strategic, application, and resource, with focus here on the first two levels. The strategic level is about the common vision that independent businesses define as part of their decision of partnership. The application level is about the business processes, which are virtually integrated as result of this common vision. Since conflicts are bound to arise among the independent applications/agents, the framework uses a formal model based upon computational argumentation theory through a persuasion protocol to detect and resolve these conflicts. Termination, soundness, and completeness properties of this protocol are presented. Distributed and centralized coordination strategies are also supported in this framework, which is illustrated with an online purchasing case study followed by its implementation in Jadex, a java-based platform for multi-agent systems. An important issue in such open multi-agent systems is how much agents trust each other. Considering the size of these systems, agents that are service providers or customers in a B2B setting cannot avoid interacting with others that are unknown or partially known regarding to some past experience. Due to the fact that agents are self-interested, they may jeopardize the mutual trust by not performing the actions as they are supposed to. To this end, our second contribution is proposing a trust model allowing agents to evaluate the credibility of other peers in the environment. Our multi-factor model applies a number of measurements in trust evaluation of other party's likely behavior. After a period of time, the actual performance of the testimony agent is compared against the information provided by interfering agents. This comparison process leads to both adjusting the credibility of the contributing agents in trust evaluation and improving the system trust evaluation by minimizing the estimation error.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal Article

Relating protocols for dynamic dispute with logics for defeasible argumentation

TL;DR: In this paper, the authors investigated to what extent protocols for dynamic disputes, i.e., disputes in which the information base can vary at different stages, can be justified in terms of logics for defeasible argumentation.
Dissertation

Sistema de Medida de Confianca para Selecc ¸ ˜ ao de Empresas em Sistemas B2B

TL;DR: The designing and specification of a trust and contextual information aggregation model, intended to be a reliable alternative to the trust aggregation models already existing, and trying to set apart from those by including rules to emulate human common sense regarding trust building, and mechanisms to obtain a recommendation grade concerning how likely is a potential partner to perform as the authors desire in the fulfilment of a given contract.
References
More filters
Journal ArticleDOI

Trust management through reputation mechanisms

TL;DR: Two complementary reputation mechanisms are investigated which rely on collaborative rating and personalized evaluation of the various ratings assigned to each user which may have applicability in other types of electronic communities such as chatrooms, newsgroups, mailing lists, etc.
Book ChapterDOI

Proof of Theorem 2

TL;DR: The inversion distance is denoted by d(A, B) for signed permutations A and B and the set of all permutations that lie on sorting paths from A to B is written as M A, B,C to denote theSet of inversion medians of three given permutations B, C, and C are written.
Journal ArticleDOI

Multiagent systems engineering

TL;DR: MaSE uses a number of graphically based models to describe system goals, behaviors, agent types, and agent communication interfaces and provides a way to specify architecture-independent detailed definition of the internal agent design.
Journal ArticleDOI

Agent communication languages: the current landscape

TL;DR: Some concepts useful in discussing agent communication languages are introduced and then the two major ACLs are compared and evaluated.
Book

Strategic Negotiation in Multiagent Environments

Sarit Kraus
TL;DR: As computers advance from isolated workstations to linked elements in complex communities of systems and people, cooperation and coordination via intelligent agents become increasingly important.
Related Papers (5)