Multi-agent system development calls for powerful and expressive coordination models and languages, as well as for an effective coordination technology. A good deal of the current research effort focuses on tuplebased coordination, exploiting its well-known advantages, such as agent uncoupling and a
An infrastructure for agent-based systems: An interagent approach
✍ Scribed by Francisco J. Martín; Enric Plaza; Juan A. Rodríguez-Aguilar
- Publisher
- John Wiley and Sons
- Year
- 2000
- Tongue
- English
- Weight
- 250 KB
- Volume
- 15
- Category
- Article
- ISSN
- 0884-8173
No coin nor oath required. For personal study only.
✦ Synopsis
We introduce an infrastructure for easing construction of agent-based systems. We argue that such infrastructure constitutes a convenient solution for releasing agent developers from cumbersome interaction issues inherent to any agent-based system, and therefore for helping them concentrate on the domain-dependent agents' logics issues. Our proposal relies upon two fundamental elements: con¨ersation protocols, coordination patterns that impose a set of rules on communicative acts uttered by agents participating Ž . in a conversation what can be said, to whom, and when , and interagents, autonomous software agents that mediate the interaction between each agent and the agent society wherein this is situated. Interagents employ conversation protocols for mediating conversations among agents. Thus management of conversation protocols is presented as raison d'etre of interagents. We also introduce JIM, our java-based implementation of a ĝeneral-purpose interagent. On one hand, we show how it handles conversation protocols in practice, and on the other hand, how it has been endowed with the capability of dealing with agent interaction at different levels by means of the SHIP protocol. Finally, we illustrate the use of interagents by explaining several roles that they play in Fishmarket, an agent-mediated electronic auction market.
📜 SIMILAR VOLUMES
Performance evaluation of persistent object system implementations requires the use and evaluation of experimental workloads. Such workloads include a schema describing how the data are related, and application behaviors that capture how the data are manipulated over time. In this paper, we describe
Many network intrusion detection systems detect intrusions by concentrating all logs of target systems in a server and having the server subsequently analyze these logs. At the Information-technology Promotion Agency (IPA), we have been developing an alternate type of network intrusion detection sys