2015
DOI: 10.1007/978-3-319-24804-2_7
|View full text |Cite
|
Sign up to set email alerts
|

Agent Protocols for Social Computation

Abstract: Abstract. Despite the fact that social computation systems involve interaction mechanisms that closely resemble well-known models of agent coordination, current applications in this area make little or no use of the techniques the agent-based systems literature has to offer. In order to bridge this gap, this paper proposes a data-driven method for defining and deploying agent interaction protocols that is entirely based on using the standard architecture of the World Wide Web. This obviates the need of bespoke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…This computational capacity embedded in information sharing activities on the Web is called sociotechnical computing, which reflects explicitly conditional actions and the inhe- applications that mediate collective interaction between humans (Shadbolt et al, 2013). This, in turn, implies a growing interest in applications that embody a multi-perspective notion of hybrid human-machine intelligence, in which human capabilities and computational artifacts complement each other (Rovatsos, 2014).…”
Section: Social Computingmentioning
confidence: 99%
“…This computational capacity embedded in information sharing activities on the Web is called sociotechnical computing, which reflects explicitly conditional actions and the inhe- applications that mediate collective interaction between humans (Shadbolt et al, 2013). This, in turn, implies a growing interest in applications that embody a multi-perspective notion of hybrid human-machine intelligence, in which human capabilities and computational artifacts complement each other (Rovatsos, 2014).…”
Section: Social Computingmentioning
confidence: 99%
“…Discovery can be either performed by actively picking members [8], or by coordinating the process of self-formation of the collective as integral part of the composition and negotiation phases. In the latter case, the OM uses a static decision tree for scheduling the messages of subscription, agreement and withdrawal to the proposed plans originating from human peers [9]. At the moment, during composition the OM generates all possible execution plans that include the participants who satisfy the required constraints.…”
Section: Peermanager (Pm)mentioning
confidence: 99%
“…Composition state: The composition process calculates feasible task execution plans, consisting of ordered activities (steps) required to process the given task and associated performer peers. Generation of execution plans is usually a task-specific, non-trivial problem involving advanced planning and constraint satisfaction algorithms, going well beyond the scope of this paper; the description of the currently offered composition algorithms can be found in [9] and here 4 . From the programming model's perspective, however, it suffices to know the required inputs and outputs of this state: the input is the 'provisioned' collective from the previous state, while the output is a list of collectives 'negotiables', associated with composed execution plans, which get passed on to the following state.…”
Section: Table I: Cbt Collaboration Models and Selection Flagsmentioning
confidence: 99%
“…A formal framework that allows general user interaction models, described as multi-agent protocols with different roles and activities, to be mapped onto orchestration architectures in ways that permit composition of complex application workflows has been previously described in [15]. Figure 1 shows an example of such a protocol, where a peer role p interacts with an orchestrator role o, traversing the different stages of the social computation lifecycle.…”
Section: Introductionmentioning
confidence: 99%
“…The participants of any proposed task t ∈ T can agree or refuse to participate in it. [15]. Swimlanes represent peer roles, boxes their internal processing steps, and diamonds choice points.…”
Section: Introductionmentioning
confidence: 99%