Annotating Cooperative Plans with Trusted Agents

نویسندگان

  • Nathan Griffiths
  • Michael Luck
  • Mark d'Inverno
چکیده

Cooperation is the single most fundamental characteristic of multiagent systems, and much work has been done on studying the various aspects involved, from general models of the overall structure of cooperation to detailed analyses of specific components. In our work, we aim to do both — we provide a general model and instantiate each stage in that model. We take the notions of trust and motivation to be fundamental to engendering successful cooperation between autonomous entities, and our model of cooperation accounts for the important roles played by these concepts. This paper focuses in particular on the details of how, based on trust, an agent chooses and keeps track of which agents it may use to assist in the performance of actions that make up a multi-agent plan, and how that information can be used in actually soliciting the assistance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Strategies of Mobile Agents on Malicious Clouds

Cloud computing is a service model enabling resources limited mobile devices to remotely execute tasks on the clouds. The Mobile Agent is a software program on behalf of the software installed in the mobile device to negotiate with other mobile agents in the clouds, which provides a diversity of automated negotiation based applications in Mobile Commences. However, the negotiation plans carried...

متن کامل

An Event-Schematic, Cooperative, Cognitive Architecture Plays Super Mario

We apply the cognitive architecture SEMLINCS to model multi-agent cooperations in a Super Mario game environment. SEMLINCS is a predictive, self-motivated control architecture that learns conceptual, event-oriented schema rules. We show how the developing, general schema rules yield cooperative behavior, taking into account individual beliefs and environmental context. The implemented agents ar...

متن کامل

Mostly-static decentralized information flow control

The growing use of mobile code in downloaded programs such as applets and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Common security mechanisms such as sandboxing and access control are either too restrictive or too weak—they prevent applications from sharing data usefully, or allow private information to leak. For example, security mechanisms in Java...

متن کامل

Task Coordination for Non-cooperative Planning Agents

We consider task planning problems where a number of noncooperative agents have to work on a joint problem. Such a problem consists in completing a set of interdependent, hierarchically ordered tasks. Each agent is assigned a subset of tasks to perform for which it has to construct a plan. Since the agents are non-cooperative, they insist on planning independently and do not want to revise thei...

متن کامل

Game-Theoretic Approach for Non-Cooperative Planning

When two or more self-interested agents put their plans to execution in the same environment, conflicts may arise as a consequence, for instance, of a common utilization of resources. In this case, an agent can postpone the execution of a particular action, if this punctually solves the conflict, or it can resort to execute a different plan if the agent’s payoff significantly diminishes due to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002