"Exhibitionists" and "Voyeurs" Do It Better: A Shared Environment for Flexible Coordination with Tacit Messages
نویسندگان
چکیده
Coordination between multiple autonomous agents is a major issue for open multi-agent systems. This paper proposes the notion of Behavioural Implicit Communication (BIC) originally devised in human and animal societies as a new and critical coordination mechanism also for artificial agents. BIC is a parasitical form of communication that exploits both some environmental properties and the agents’ capacity to interpret their actions. In this paper we abstract from the agents’ architecture to focus on the interaction mediated by the environment. Observability of the environment – and in particular of agents’ actions – is crucial for implementing BIC-based form of coordination in artificial societies. Accordingly in this paper we introduce an abstract model of environment providing services to enhance observation power of agents, enabling BIC and other form of observation-based coordination. Also, we describe a typology of environments and examples of observation based coordination with and without implicit communication.
منابع مشابه
Developing a Model of Internalof Internal Organizational Factors Effective on Tacit Knowledge Management of Social Security Organization: Grounded Theory Approach
Introduction: The need to design and establish an integrated knowledge management system is one of the strategic issues of the social security organization. The present research was conducted with the aim of developing a model of Internal organizational factors effective on tacit knowledge management of social security organization with the Grounded Theory approach. Method: The current study i...
متن کاملMass Media vs. the Mass of Media: A Study on the Human Nodes in a Social Network and their Chosen Messages
In Internet-based social networks, the nodes have the most pivotal role in the processes and outcomes of the networks. Whether they pay attention to a message in the network or ignore it defines the fate of the message. One message is shared and re-shared by millions of users and another is left forgotten. The current study tries to shed light on one aspect of the role of the users in a social ...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملStreamlining the planning approval process for a sustainable urban development: A case study for unwinding man-made complexities
The urban development process displays regressive tacit-dominant knowledge areas and their tacit level would impede their movements during multi-level knowledge transfers among stakeholders. The accuracy of a knowledge may be distorted when recipient stakeholders fail to understand a specific knowledge for its purpose. Earlier studies by the authors had highlighted complex yet dynamic environme...
متن کاملAn Improved Token-Based and Starvation Free Distributed Mutual Exclusion Algorithm
Distributed mutual exclusion is a fundamental problem of distributed systems that coordinates the access to critical shared resources. It concerns with how the various distributed processes access to the shared resources in a mutually exclusive manner. This paper presents fully distributed improved token based mutual exclusion algorithm for distributed system. In this algorithm, a process which...
متن کامل