Annotating Cooperative Plans with Trusted Agents
نویسندگان
چکیده
Cooperation is the single most fundamental characteristic of multiagent systems, and much work has been done on studying the various aspects involved, from general models of the overall structure of cooperation to detailed analyses of specific components. In our work, we aim to do both — we provide a general model and instantiate each stage in that model. We take the notions of trust and motivation to be fundamental to engendering successful cooperation between autonomous entities, and our model of cooperation accounts for the important roles played by these concepts. This paper focuses in particular on the details of how, based on trust, an agent chooses and keeps track of which agents it may use to assist in the performance of actions that make up a multi-agent plan, and how that information can be used in actually soliciting the assistance.
منابع مشابه
Strategies of Mobile Agents on Malicious Clouds
Cloud computing is a service model enabling resources limited mobile devices to remotely execute tasks on the clouds. The Mobile Agent is a software program on behalf of the software installed in the mobile device to negotiate with other mobile agents in the clouds, which provides a diversity of automated negotiation based applications in Mobile Commences. However, the negotiation plans carried...
متن کاملAn Event-Schematic, Cooperative, Cognitive Architecture Plays Super Mario
We apply the cognitive architecture SEMLINCS to model multi-agent cooperations in a Super Mario game environment. SEMLINCS is a predictive, self-motivated control architecture that learns conceptual, event-oriented schema rules. We show how the developing, general schema rules yield cooperative behavior, taking into account individual beliefs and environmental context. The implemented agents ar...
متن کاملMostly-static decentralized information flow control
The growing use of mobile code in downloaded programs such as applets and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Common security mechanisms such as sandboxing and access control are either too restrictive or too weak—they prevent applications from sharing data usefully, or allow private information to leak. For example, security mechanisms in Java...
متن کاملTask Coordination for Non-cooperative Planning Agents
We consider task planning problems where a number of noncooperative agents have to work on a joint problem. Such a problem consists in completing a set of interdependent, hierarchically ordered tasks. Each agent is assigned a subset of tasks to perform for which it has to construct a plan. Since the agents are non-cooperative, they insist on planning independently and do not want to revise thei...
متن کاملGame-Theoretic Approach for Non-Cooperative Planning
When two or more self-interested agents put their plans to execution in the same environment, conflicts may arise as a consequence, for instance, of a common utilization of resources. In this case, an agent can postpone the execution of a particular action, if this punctually solves the conflict, or it can resort to execute a different plan if the agent’s payoff significantly diminishes due to ...
متن کامل