skip to main content
10.1145/1160633.1160884acmconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
Article

Contextualizing commitment protocol

Published:08 May 2006Publication History

ABSTRACT

Commitment protocols are modularized specifications of interactions understood in terms of commitments. Purchase is a classic example of a protocol. Although a typical protocol would capture the essence of the interactions desired, in practice, it should be adapted depending on the circumstances or context and the agents' preferences based on that context. For example, when applying purchase in different contexts, it may help to allow sending reminders for payments or returning goods to obtain a refund. We contextualize a protocol by adapting it via different transformations.Our contributions are the following: (1) a protocol is transformed by composing its specification with a transformer specification; (2) contextualization is characterized operationally by relating the original and transformed protocols; and (3) contextualization is related to protocol compliance.

References

  1. Paolo Bresciani, Anna Perini, Paolo Giorgini, Fausto Giunchiglia, and John Mylopoulos. Tropos: An agent-oriented software development methodology. Journal of Autonomous Agents and Multiagent Systems, 8(3):203--236, May 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Enrico Giunchiglia, Joohyung Lee, Vladimir Lifschitz, Norman McCain, and Hudson Turner. Nonmonotonic causal theories. Artificial Intelligence, 153(1--2):49--104, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ashok U. Mallya and Munindar P. Singh. An algebra for commitment protocols. Journal of Autonomous Agents and Multiagent Systems special issue on Agent Communication, 2006. To appear. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Hamza Mazouzi, Amal El Fallah Seghrouchni, and Serge Haddad. Open protocol design for complex interactions in multi-agent systems. In Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, pages 517--526, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. H. Van Dyke Parunak. Visualizing agent conversations: Using enhanced Dooley graphs for agent design and analysis. In Proceedings of the 2nd International Conference on Multiagent Systems, pages 275--282. AAAI Press, 1996.Google ScholarGoogle Scholar
  6. Munindar P. Singh. An ontology for commitments in multiagent systems: Toward a unification of normative concepts. Artificial Intelligence and Law, 7:97--113, 1999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Clemens Szyperski. Components and the way ahead. In Gary T. Leavens and Murali Sitaraman, editors, Foundations of Component-Based Systems, chapter 1, pages 1--20. Cambridge University Press, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Uniform commercial code. http://www.law.cornell.edu/ucc/ucc.table.html.Google ScholarGoogle Scholar
  9. Mahadevan Venkatraman and Munindar P. Singh. Verifying compliance with commitment protocols: Enabling open Web-based multiagent systems. Journal of Autonomous Agents and Multi-Agent Systems, 2(3):217--236, September 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Benjamin Vitteau and Marc-Philippe Huget. Modularity in interaction protocols. In Frank Dignum, editor, Advances in Agent Communication, volume 2922 of Lecture Notes in Computer Science, pages 291--309, 2004.Google ScholarGoogle Scholar

Index Terms

  1. Contextualizing commitment protocol

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      AAMAS '06: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
      May 2006
      1631 pages
      ISBN:1595933034
      DOI:10.1145/1160633

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 May 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate1,155of5,036submissions,23%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader