SOCS deliverables (now downloadable!)


 

SOCS publications (not up-to-date)


2004

[UNIBO-DIFERRARA/Alberti/AlbertiCILC2004] M. Alberti, M. Gavanelli, E. Lamma, P. Mello, P. Torroni. Abduction with Hypotheses Confirmation. In Atti del Diciannovesimo incontro annuale dell'Associazione Italiana GULP (CILC'04). June 2004.

Abstract: Abduction can be seen as the formal inference corresponding to human hypothesis making. It typically has the purpose of explaining some given observation. In classical abduction, hypotheses could be made on events that may have occurred in the past. In general, abductive reasoning can be used to generate hypotheses about events possibly occurring in the future (forecasting), or may suggest further investigations that will confirm or disconfirm the hypotheses made in a previous step (as in scientific reasoning). We propose an operational framework based on Abductive Logic Programming, which extends existing frameworks in many respects, including accommodating dynamic observations and hypothesis confirmation.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2,WP3]: The paper presents the SCIFF abductive framework and proof procedure, researched in WP2 and WP3 to formalize compliance of computee behaviour to agent interaction protocols, in the more general perspective of the generation and confirmation of hypotheses in hypothetical reasoning.

[UNIBO-DIFERRARA/Chesani/SOCS-SI-demo] M. Alberti, F. Chesani, M. Gavanelli, E. Lamma, P. Mello, P. Torroni. A Demonstration of SOCS-SI for AAMAS'04. In AAMAS'04 Conference, Demo Session, and Diciannovesimo Incontro dell'Associazione Italiana GULP (CILC'04), June-July 2004.

Abstract: The paper describes the demonstration of the SOCS-SI tool that will be given in the Demo session of AAMAS '04 Conference. The demonstration will show the concrete example of a "first price sealed bid" auction.

CONTRIBUTION TO SOCS WORKPACKAGES [WP4,WP6]: The demonstration focuses on the SOCS-SI tool, which was developed in WP4 as the verifier of compliance of computee interaction to interaction protocols, and will be used in WP6 for experimentation.

[UNIBO/DIFERRARA/Torroni/tapocs04-torroni] P. Torroni, M. Alberti, F. Chesani, M. Gavanelli, E. Lamma, P. Mello. In Proceedings of the 13th IEEE International workshops on Enabling technologies: Infrastructures for collaborative enterprises (WETICE-2004), 2nd International Workshop "Theory and practice of open computational systems (TAPOCS). Modena, Italy, June 14, 2004. IEEE Press. To appear.

Abstract: An important challenge posed by the design of open information systems concerns the choice of suitable methods to harness their complexity and to guarantee the correctness of their behaviour. In recent times, logic programming has been proposed as a powerful technology, formal and declarative, for the specification and verification of agent based and open systems. In this work, we focus on the interaction design. We base our approach on a logic-based formalism, which can be used to define the semantics of agent communication languages and interaction protocols. We advocate its use within a more general framework, drawing a design methodology which encompasses the specification of the interaction space and of its desired properties, and their verification.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2,WP3,WP4,WP5]: The paper proposes a method for the design of the interaction space in multiagent system, by exploiting the declarative abductive framework defined in WP2, and its operational counterpart, defined in WP3 and implemented in WP4. It also explores the possibility of using this framework to prove properties of multiagent systems, which is subject of WP5.

[DIFERRARA/Alberti/alberti-lamma-unif04] M.Alberti, E.Lamma. Inference with arbitrarily quantified variables: preliminary report. In Proceedings of the 18th International Workshop on Unification (UNIF 2004), Cork, July 2004.

Abstract: First order reasoning requires to solve unification problems. Most first-order unification algorithms have been designed to solve existentially quantified sets of equations, but also more general settings where equations need to be solved under a mixed quantifier prefix have been considered in the literature. In this work, we discuss the case of inferences with arbitrarily quantified variables. We first introduce arbitrary quantifiers (possibly mixed) over variables as intensional notation standing for a corresponding extensional, semantical counterpart. Unification of variables (possibly differently quantified) is then mapped into corresponding operations over these extensional counterparts. In the paper, we also give soundness results for the proposed approach, and show how resolution can be covered in the framework.

CONTRIBUTION TO SOCS WORKPACKAGES [WP3,WP4]: The paper introduces and proves sound an inference rule applicable to a first order theory with arbitrarily quantified variables: this is relevant to the \sciff proof procedure, which, both in its definition and in its implementation, needs to cope with formulae where existential and universal quantifiers (possibly restricted) are applied to variables.

[UNIBO-DIFERRARA/Lamma/deonSOCS-aiia04] Marco Alberti, Marco Gavanelli, Evelina Lamma, Paola Mello, Giovanni Sartor, Paolo Torroni. In Alfredo Milani, ed., Atti della Conferenza Italiana sui Sistemi Intelligenti CISI-04, 9th AI*IA Convention. Workshop Agenti e Vincoli: Modelli e Tecnologie per Dominare la Complessità. Perugia, Italy, 2004. Morlacchi Editore, Perugia. ISBN 88-89422-09-2.

Abstract: A number of approaches to agent society modeling can be found in the Multi-Agent Systems literature which exploit (variants of) Deontic Logic. In this paper, after briefly mentioning related approaches, we focus on the Computational Logic (CL) approach for society modeling developed within the UE IST-2001-32530 Project (named SOCS), where obligations and prohibitions are mapped into abducible predicates (respectively, positive and negative expectations), and norms ruling the behavior of members are represented as abductive integrity constraints. We discuss how this abductive framework can deal with Deontic Logic concepts, by introducing additional integrity constraints.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2,WP3]: The paper proposes a mapping of deontic operators onto the abducibles of the SCIFF abductive framework, in order to link the deontic-based agent specification framework to ours, at both the declarative semantics (WP2) and operational counterpart (WP3) levels.

[UNIBO-DIFERRARA/Milano/aste-bofe-aiia04] Marco Alberti, Federico Chesani, Marco Gavanelli, Alessio Guerri, Evelina Lamma, Paola Mello, Paolo Torroni. Expressing Interaction in Combinatorial Auction through Social Integrity Constraints. In Alfredo Milani, ed., Atti della Conferenza Italiana sui Sistemi Intelligenti CISI-04, 9th AI*IA Convention. Workshop Agenti e Vincoli: Modelli e Tecnologie per Dominare la Complessità. Perugia, Italy, 2004. Morlacchi Editore, Perugia. ISBN 88-89422-09-2

Abstract: Combinatorial Auctions are an attractive application of intelligent agents; their applications are countless and are shown to provide good revenues. In a combinatorial auction, bidders can bid not only on single items, but also on sets of items; in this way, bidders can express complementarity of the goods offered in the auction. On the other hand, the computational complexity of the solving process (the Winner Determination Problem, WDP) is $NP$-hard; this delayed their practical use. Recently, efficient solvers have been applied to the WDP, so the framework starts to be viable. A second issue, common also to many other agent systems, is trust: in order for an agent system to be used, the users must trust both their representative and the other agents inhabiting the society: malicious agents must be found, and their violations discovered. The SOCS project addresses such issues, and provided a language, the social integrity constraints, for defining the allowed interaction moves, together with a proof-procedure (called SCIFF) able to detect violations. In this paper we show how to write a protocol for the combinatorial auctions by using social integrity constraints. In the devised protocol, the auctioneer interacts with an external solver that finds a solution to the winner determination problem.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2,WP4,WP6]: The paper presents the modelling of a concrete scenario (combinatorial auction) in the SOCS social framework, defined in WP2. It also shows the results of the experimentation (relevant to WP6) of this scenario using the SOCS-SI tool, developed for WP4.

[CITY/Stathis/] K. Stathis, A. Kakas, W. Lu, N. Demetriou, U. Endriss, A. Bracciali "PROSOCS: a platform for programming software agents in computational logic" To appear in Proceedings 4th Symposium from Agent Theories to Agent Implementations, AT2AI04, Vienna, April 2004.

Abstract: We present the design and implementation of PROSOCS, a platform supporting the programming of software agents that have a ``mind'' and a ``body''. The mind reasons autonomously and logically via a collection of logic theories with generic functionality, developed using various extensions of logic programming, and controls the overall behaviour of the agent via a ``cycle theory'' that specifies preferred patterns of operation. The body, on the other hand, provides sensors and effectors for the mind to be able to access and change the environment in which the agent is situated. PROSOCS has been developed using Prolog - to program the functionality of the mind, Java - to program the functionality of the body, and the Peer-to-Peer system JXTA - to provide the functionality required for agent bodies to communicate and interact in an open distributed environment.

CONTRIBUTION TO SOCS WORKPACKAGES []

[ICSTM/Endriss/EndrissEtAlAAC2004] Ulle Endriss, Nicolas Maudet, Fariba Sadri, and Francesca Toni. Logic-based Agent Communication Protocols. In Advances in Agent Communication, LNAI 2922, Springer-Verlag, 2004.

Abstract: An agent communication protocol specifies the rules of interaction governing a dialogue between agents in a multiagent system. In non-cooperative interactions (such as negotiation dialogues) occurring in open societies the problem of checking an agent's conformance to such a protocol is a central issue. We identify different levels of conformance (weak, exhaustive, and robust conformance) and explore, for a specific class of logic-based agents and an appropriate class of protocols, how to check an agent's conformance to a protocol a priori on the basis of the agent's specification.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2,WP5]: This paper provides a consolidation of our work on shallow protocols, the representation of protocols using simple integrity constraints, levels of conformance, and a priori conformance checking carried out in the first two years of the project. It extends our main paper in this area (IJCAI-2003) by presenting additional results on exhaustive conformance checking and by discussing possible extensions of our methodology to non-shallow protocols. Like the IJCAI-2003 paper, it is particularly relevant to WP2 and WP5.

[ICSTM/Endriss/EndrissEtAlARW2004] Ulle Endriss, Paolo Mancarella, Fariba Sadri, Giacomo Terreni, and Francesca Toni. Abductive Logic Programming with CIFF. In Proceedings of the 11th Workshop on Automated Reasoning (ARW-2004), March 2004. Extended Abstract.

Abstract: This extended abstract introduces the CIFF proof procedure for abductive logic programming with constraints and its implementation.

CONTRIBUTION TO SOCS WORKPACKAGES [WP3,WP4]: The definition of the CIFF procedure is one of the central contributions of WP3, which deals with the computational counterparts of the formal models developed in the first phase of the project. In particular the planning, reactivity and temporal reasoning capabilities of computees have been modelled using abductive logic programming with constraints and CIFF is a suitable proof procedure for this formalism. The paper also relevant to WP4, because it announces our implementation of CIFF.

[ICSTM/Endriss/EndrissEtAlTR2004] Ulle Endriss, Paolo Mancarella, Fariba Sadri, Giacomo Terreni, and Francesca Toni. The CIFF Proof Procedure: Definition and Soundness Results. Technical Report 2004/2, Department of Computing, Imperial College London, May 2004.

Abstract: We introduce a new proof procedure for abductive logic programming and prove two soundness results. Our procedure extends that of Fung and Kowalski by integrating abductive reasoning with constraint solving and by relaxing the restrictions on allowed inputs for which the procedure can operate correctly. An implementation of our proof procedure is available and has been applied successfully in the context of multiagent systems.

CONTRIBUTION TO SOCS WORKPACKAGES [WP3]: The CIFF proof procedure for abductive logic programming with constraints is one of the central contributions of WP3. This paper presents the procedure in detail and contains the proofs for our soundness results for this procedure.

[ICSTM/Endriss/EndrissMaudetAAMAS2004] Ulle Endriss and Nicolas Maudet. On the Communication Complexity of Multilateral Trading. In Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-2004), IEEE Computer Society Press, July 2004.

Abstract. We study the complexity of a multilateral negotiation framework where autonomous agents agree on a sequence of deals to exchange sets of discrete resources in order to both further their own goals and to achieve a distribution of resources that is socially optimal. When analysing such a framework, we can distinguish different aspects of complexity: How many deals are required to reach an optimal allocation of resources? How many communicative exchanges are required to agree on one such deal? How complex a communication language do we require? And finally, how complex is the reasoning task faced by each agent? This paper presents a number of results pertaining, in particular, to the first of these questions.

CONTRIBUTION TO SOCS WORKPACKAGES [WP5]. This paper continues our work on microeconomic properties of societies of computees, which is one of the classes of verifiable properties that we have identified as being of particular interest to our work on WP5.

[ICSTM/Endriss/EndrissEtAlCILC2004] Ulle Endriss, Paolo Mancarella, Fariba Sadri, Giacomo Terreni, and Francesca Toni. Abductive Logic Programming with CIFF: Implementation and Applications. In Proceedings of the Italian Conference on Computational Logic (CILC-2004), June 2004.

Abstract. We describe a system implementing a novel extension of Fung and Kowalski's IFF abductive proof procedure which we call CIFF, and its application to realise intelligent agents that can construct (partial or complete) plans and react to changes in the environment. CIFF extends the original IFF procedure in two ways: by dealing with constraint predicates and by dealing with non-allowed abductive logic programs.

CONTRIBUTION TO SOCS WORKPACKAGES [WP3,WP4]. This paper is relevant to WP4 as it describes the implementation of the CIFF proof procedure used in the PROSOCS platform. It is also relevant to WP3, because it discusses our approach to partial planning, which is based reasoning with CIFF.

[UNIBO/Milano/] M.Milano and A.Roli. MAGMA: A Multiagent Architecture for Metaheuristics. IEEE Trans. on Systems, Men and Cybernetics - Part B, Vol.34, Issue 2, April 2004.

Abstract: In this work we introduce a multiagent architecture (MAGMA, MultiAGent Metaheuristics Architecture) conceived as a conceptual and practical framework for metaheuristic algorithms. Metaheuristics can be seen as the result of the interaction among different kinds of agents: the basic architecture contains three levels each hosting one or more agents. Level-0 agents build solutions, level-1 agents improve solutions and level-2 agents provide the high level strategy. In this framework, classical metaheuristic algorithms can be smoothly accommodated and extended. The basic three level architecture can be enhanced with the introduction of a fourth level of agents, level-3 agents, coordinating lower level agents. With this additional level, MAGMA can also describe, in a uniform way, cooperative search and, in general, any combination of metaheuristics. We describe the whole architecture, the structure of agents in each level in terms of tuples, and the structure of their coordination as a Labelled Transition System. We propose this perspective with the aim to achieve a better and clearer understanding of metaheuristics, obtain hybrid algorithms, suggest guidelines for a software engineering-oriented implementation and for didactic purposes. Some specializations of the general architecture will be provided in order to show that existing metaheuristics (e.g., GRASP, Ant Colony Optimization, Iterated Local Search, Memetic Algorithms) can be easily described in our framework. We describe cooperative search and large neighborhood search in the proposed framework exploiting level-3 agents. We show also that a simple hybrid algorithm, called Guided Restart Iterated Local Search, can be easily conceived as a combination of existing components in our framework.

CONTRIBUTION TO SOCS WORKPACKAGES []

[UCY-DIPISA/Kakas/] Antonis C. Kakas, P. Mancarella, F. Sadri, K. Stathis and F. Toni, The KGP Model of Agency

Abstract: This paper presents a new model of agency, called the KGP (Knowledge, Goals and Plan) model. This model draws from the classic BDI model and proposes a hierarchical agent architecture with a highly modular structure that synthesises together various reasoning and sensing capabilities of the agent in an open and dynamic environment. The novel features of the model include: its innovative use of Computational Logic (CL) in a way that facilitates both the formal analysis of the model and its computational realisability directly from the high-level specification of the agents (a first prototype for the development of KGP agents exists, based upon a correct computational counterpart of the model); the modular separation of concerns and flexibility afforded by the model in designing heterogeneous agents and in developing independently the various components of an agent; and the declarative agent control provided through a context-sensitive cycle CL theory component that regulates the agent's operational behaviour, according to the current circumstances of operation, thus breaking away from the conventional one-size-fits-all control of operation.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1]:This paper presents the KGP model of individual computees as detailed in deliverable D4 of the project.

[UCY-CITY/Kakas/] Antonis C. Kakas, Nicolas Maudet, and Pavlos Moraitis, Flexible Agent Dialogue Strategies and Societal Communication Protocols.

Abstract: We propose an argumentation-based framework for representing communication theories of agents that can take into account dialogue strategies and society protocols in a way that facilitates their modular development and extension. The proposed framework is flexible in handling context dependent strategies and protocols that can also include special circumstances.

CONTRIBUTION TO SOCS WORKPACKAGES [WP5]: This paper shows how different policies of a computee can be integrated together. This will be useful in our studies of properties of computees and their social interaction.

[DIFERRARA-UNIBO/Alberti/Daolio-SAC2004] Marco Alberti, Davide Daolio, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni, Specification and verification of agent interaction protocols in a logic-based system. In Proceedings of the 19th Annual ACM Symposium on Applied Computing (SAC 2004). Special Track on Agents, Interactions, Mobility, and Systems (AIMS), Nicosa, Cyprus, Mar. 14-17 2004. ACM Press. To appear.

Abstract: In multiagent systems, agent interaction is ruled by means of interaction protocols. Compliance to protocols can be hardwired in agent programs; however, this requires that only "certified'' agents interact. In open societies, composed of autonomous and heterogeneous agents whose internal structure is, in general, not accessible, interaction protocols should be specified in terms of the agent observable behaviour, and compliance should be verified by an external entity. In this paper, we propose a Java-Prolog-CHR system for verification of compliance of agents' behaviour to protocols specified in a logic-based formalism (Social Integrity Constraints). We also present the application of the formalism and the system to the specification and verification of the FIPA Contract-Net protocol.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2, WP3, WP4]: The article presents a modified version of Social Integrity Constraints as introduced in WP2; it also presents a Java/Prolog/CHR-based verification system, which has served as a preliminary version of the prototype object of WP4.

[DIFERRARA-UNIBO/Gavanelli/CLIMA-IV-gavanelli] Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni, An abductive framework for information sharing in multi-agent systems. In J. Dix and J. Leite, editors, CLIMA-IV: Computational Logic in Multi-Agent Systems, Fourth International Workshop. Proceedings, Fort Lauderdale, FL, USA, Jan. 6-7 2004. To appear in the series Lecture Notes in Artificial Intelligence, published by Springer-Verlag.

Abstract: In this paper, we propose a framework for information exchange among abductive agents whose local knowledge bases are enlarged with a set of abduced hypotheses. We integrate the aspects of information exchange and abductive reasoning, and show theoretically the information inferred by the single abductive agent as a product of joint reasoning activity. We show examples, like dining philosophers, resource exchange and speculative computation, and give an implementation of the space of interactions based on CLP(SET).

CONTRIBUTION TO SOCS WORKPACKAGES [WP2, WP3]: The paper studies the information exchanged among a group of abductive agents that try to reach an agreement, when they share a common hypotheses space. This study was performed as an early model for the society, in order to understand the feasibility (both from WP2 and WP3 viewpoints) of a society which has a goal to reach given in a declarative language, and the computees do not have an explicit protocol, but their interaction patterns are ruled by a set of integrity constraints.

[UNIBO-DIPISA/Torroni/CLIMA-IV-bracciali] Andrea Bracciali and Paolo Torroni, A New Framework for Knowledge Revision of Abductive Agents through their Interaction (preliminary report). In J. Dix and J. Leite, editors, CLIMA-IV: Computational Logic in Multi-Agent Systems, Fourth International Workshop. Proceedings, Fort Lauderdale, FL, USA, Jan. 6-7 2004. To appear in the series Lecture Notes in Artificial Intelligence, published by Springer-Verlag.

Abstract: The aim of this work is the design of a framework for the interaction among abductive reasoning agents, addressing issues such as how to exploit knowledge multiplicity to find abductive explanations that agents could not individually find, what information must be passed or requested, how agents can take advantage from the answers that they obtain, and how they can revise their reasoning process as a consequence of interacting with each other. In this preliminary report, we describe a novel negotiation framework in which agents will exchange not only abductive hypotheses but also meta-knowledge, such as their own integrity constraints. Besides, we formalise some aspects of such a framework, introducing an algebra of integrity constraints, aimed at formally supporting the updating/revising process of the agent knowledge.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1, WP2, WP3, WP5]: WP2 and WP5 aims at modelling interaction and at verifying properties of interaction among computees. Such interactions are normally motivated by the computee's state, defined in WP1 and WP3. This work aims at exploring means and properties of richer forms of interaction than those presented in the SOCS deliverables, in a negotiation scenario, and with a focus on the revision of the knowledge of computees as a result of interaction.

[UNIBO-DIFERRARA/Chesani/alberti04compliance] Marco Alberti, Federico Chesani, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni, Compliance Verification of Agent Interaction: a Logic-based Tool. In R. Trappl, editor, Proceedings of the 17th European Meeting on Cybernetics and Systems Research (EMCSR'2004), Vol. II, Symposium "From Agent Theory to Agent Implementation" (AT2AI-4), pp. 570-575, Vienna, Austria, April 13-16, 2004. Austrian Society for Cybernetic Studies.

Abstract: In open societies of agents, where agents are autonomous and heterogeneous, it is not realistic to assume that agents will always act so as to comply to interaction protocols. Thus, the need arises for a formalism to specify constraints on agent interaction, and for an external tool able to observe and check for its compliance to interaction protocols. In this paper we present a Java-Prolog software component which can be used to verify compliance of agent interaction to interaction protocols written in a logic-based formalism (Social Integrity Constraints).

CONTRIBUTION TO SOCS WORKPACKAGES [WP3, WP4]: The article presents Social Infrastructure prototype that has been developed for WP4; it also shows the correspondence between the abductive proof procedure, subject of WP3, and the Prolog/CHR-based implementation.


2003

[DIPISA/Mancarella/] P. Mancarella and G. Terreni An abductive proof procedure handling active rules. Proceedings AI*IA 2003 Springer Verlag LNCS 2829

Abstract. We present a simple, though powerful extension of an abductive proof procedure proposed in the literature, the so-called KM-procedure, which allows one to properly treat more general forms of integrity constraints than those handled by the original procedure. These constraints are viewed as active rules, and their treatment allows the integration of a limited form of forward reasoning within the basic, backward reasoning framework upon which the KM-procedure is based. We first provide some background on Abductive Logic Programming and the KM-procedure and then formally present the extension, named AKM-procedure. The usefulness of the extension is shown by means of some simple examples.

CONTRIBUTION TO SOCS WORKPACKAGES [WP3]: This work is relevant to WP3 in exploring alternative abductive proof procedure suitable to implement the KGP model.

[CITY/Stathis/] M. Witkowski, K. Stathis A Dialectic Architecture for Computational Autonomy In Proceedings of Workshop "Computational autonomy: potential, risks, solutions" (AAMAS-03), Melbourne, Australia.

Abstract: This paper takes the view that to be considered autonomous, a software agent must possess the means by which to manage its own motivations and so arbitrate between competing internal goals. Using the motivational theories of Abraham Maslow as a starting point, we investigate the role that argumentation processes might play in balancing the many competing aspects of a whole agent's motivational agenda. This is developed into an Agent Argumentation Architecture (AAA) in which multiple ``faculties'' argue for different aspects of the total behavior of the Agent. The overall effect of these internal arguments then defines which actions the agent will select for expression, and so define the overt and observable ``personality'' of the agent.

CONTRIBUTION TO SOCS WORKPACKAGES []

[CITY/Stathis/] W. Lu, N. Maudet, K. Stathis. Building Socio-Cognitive Grids by Combining Peer-to-Peer Computing with Computational Logic. Proceedings 1st International Workshop on "Socio-Cognitive Grids: The Net as a Universal Human Resource" (TALES 2003), Santorini, Greece.

Abstract: We present the initial design considerations of an implementation framework that combines computational logic - in the form of extensions of logic programming, with Peer-to-peer Computing - in the form of distributed network protocols that allow components to communicate and discover each other. We discuss how the combination of these technologies will allow us to build agent-based systems with cognitive and social capabilities. We exemplify the discussion by illustrating the potential of how to use agents of this kind to build socio-cognitive grids.

CONTRIBUTION TO SOCS WORKPACKAGES []

[ICSTM/Endriss/FernandezEndrissTBILISI2003] Raquel Fernandez and Ulle Endriss. Abstract Models for Dialogue Protocols. In Proceedings of the 5th International Tbilisi Symposium on Language, Logic and Computation, October 2003.

Abstract: We examine a variety of dialogue protocols, taking inspiration from two fields: natural language dialogue modelling and multiagent systems. In communicative interactions, one can identify different features that may increase the complexity of the dialogue structure. This motivates a hierarchy of abstract models for protocols that takes as a starting point protocols based on deterministic finite automata. From there, we proceed by looking at particular examples that justify either an enrichment or a restriction of the initial model.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1,WP2,WP5]: This paper is a first attempt to give a classification of communication protocols in computation-theoretic terms. In this sense, it is relevant to both WP2 (which addresses the definition of communication protocols) and WP5 (which studies properties of such protocols). It also establishes connections between issues studied within SOCS and problems studied in computational linguistics.

[ICSTM-CITY/Endriss/EndrissMaudetESAW2003] Ulle Endriss and Nicolas Maudet. Welfare Engineering in Multiagent Systems. In Proceedings of the 4th International Workshop on Engineering Societies in the Agents World (ESAW-2003), October 2003.

Abstract: A multiagent system may be regarded as an artificial society of autonomous software agents. Welfare economics provides formal models of how the distribution of resources amongst the members of a society affects the well-being of that society as a whole. In multiagent systems research, the concept of social welfare is usually given a utilitarian interpretation, i.e. whatever increases the average welfare of the agents inhabiting a society is taken to be beneficial for society as well. While this is indeed appropriate for a wide range of applications, we believe that it is worthwhile to also consider some of the other social welfare orderings that have been studied in the social sciences. In this paper, we put forward an engineering approach to welfare economics in multiagent systems by investigating the following question: Given a particular social welfare ordering appropriate for some application domain, how can we design criteria that will allow agents to decide locally whether or not a proposed deal would further social welfare with respect to that ordering? In particular, we review previous results on negotiating Pareto optimal allocations of resources as well as allocations that maximise egalitarian social welfare under this general perspective. We also provide new results on negotiating Lorenz optimal allocations, which may be regarded as a compromise between the utilitarian and the egalitarian approaches. Finally, we briefly discuss elitist agent societies, where social welfare is tied to the welfare of the most successful agent, and envy-freeness.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1,WP2,WP5]: This paper continues our analysis of the problem of reallocating resources in open societies by means of negotiation, one of the central problems addressed by the Global Computing initiative. It is also relevant to WP5, as it defines further interesting properties of societies of computees.

[CITY-ICSTM/Endriss/EndrissEtAlESAW2003] Ulle Endriss, Wenjin Lu, Nicolas Maudet, and Kostas Stathis. Competent Agents and Customising Protocols. In Proceedings of the 4th International Workshop on Engineering Societies in the Agents World (ESAW-2003), October 2003.

Abstract: In open agent societies, communication protocols and strategies cannot be assumed to always match perfectly, because they are typically specified by different designers. These potential discrepancies raise a number of interesting issues, most notably the problem of checking that the behaviour of an agent is (or will be) conformant to the rules described by a protocol. In this paper, we argue that the ability to merely conform to a protocol is not sufficient for an agent to be a competent user of that protocol. We approach the intuitive idea of protocol competence by introducing a notion that considers, broadly speaking, an agent's ability to reach a particular state of the interaction and we provide preliminary results that allow us to automatically check competence in the context of a specific class of logic-based agents. Finally, we illustrate how these results can facilitate the customisation of protocols used by agents that are not fully competent.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2,WP5]: Properties of communication protocols are amongst the central issues of concern in SOCS and this paper continues our investigations in this area.

[DIFERRARA-UNIBO/Gavanelli/AGP2003-gavanelli] Marco Gavanelli, Evelina Lamma, Paola Mello, Michela Milano, and Paolo Torroni, Interpreting Abduction in CLP. In F. Buccafurri, editor, APPIA-GULP-PRODE Joint Conference on Declarative Programming, pages 25-35, Università Mediterranea di Reggio Calabria, Italy, Sept. 3-5 2003.

Abstract: Constraint Logic Programming (CLP) and Abductive Logic Programming (ALP) share the important concept of conditional answer. We exploit their deep similarities to implement an efficient abductive solver where abducibles are treated as constraints. We propose two possible implementations, in which integrity constraints are exploited either (i) as the definition of a CLP solver on an abductive domain, or (ii) as constraints à la CLP. Both the solvers are implemented on top of CLP(Bool), that typically have impressively efficient propagation engines.

CONTRIBUTION TO SOCS WORKPACKAGES [WP4]: For the implementation of the abductive proof procedure (WP4), we decided to check the feasibility of a CHR (Constraint Handling Rules) implementation. In fact, CHR is naturally linked to the constraint solver, so the integration of abduction and constraint solving should be simplified. The paper presents two explored implementations of an abductive proof procedure in CHR, that show different features.

[UNIBO-DIFERRARA/Torroni/LCMAS2003torroni] Marco Alberti, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni. Specification and verification of agent interactions using social integrity constraints. In Wiebe van der Hoek, Alessio Lomuscio, Erik de Vink, and Mike Wooldridge, editors, Proceedings of the Workshop on Logic and Communication in Multi-Agent Systems, LCMAS 2003, Eindhoven, the Netherlands, 29 June 2003. Electronic Notes in Theoretical Computer Science, Vol. 85 No. 2, Elsevier Science, October 2003.

Abstract: In this paper we propose a logic-based social approach to the specification and verification of agent interaction. We firstly introduce integrity constraints about social acts (called Social Integrity Constraints) as a formalism to express interaction protocols and to give a social semantics to the behavior of agents, focusing on communicative acts. Then, we discuss several possible kinds of verification of agent interaction, and we show how social integrity constraints can be used to verify some properties in this respect. We focus our attention on static verification of compliance of agent specifications to interaction protocols, and on run-time verification, based on agents' observable behavior. We adopt as a running example the NetBill security transaction protocol for the selling and delivery of information goods.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2, WP3, WP4, WP5]: The paper, based on an early version of Social Integrity Constraints (subject of WP2), investigates the applicability of our approach to different kinds of verification of properties (WP5). The paper also presents the basic strategy of verification that we formalize as an abductive proof procedure in WP3, and a Prolog/CHR-based implementation which is being expanded for WP4.

[UNIBO-ICSTM/Torroni/IJCAI03-multistage] Fariba Sadri, Francesca Toni, and Paolo Torroni, Minimally intrusive negotiating agents for resource sharing. In G. Gottlob, editor, Proceedings of the 18th International Joint Conference on Artificial Intelligence (IJCAI) . AAAI Press, August 2003. To appear.

Abstract: We study the problem of agents negotiating periods of time during which they can have use of resources, thus allowing for the sharing of resources. We define a multi-stage negotiation framework where agents, in order to obtain resources, step through a sequence of stages, each characterised by an increased chance of a mutually agreeable deal but at the price of disclosing more and more information. In the sequence, the agents may agree to move to the next stage if the previous stage fails to produce a deal amongst them. In this paper, we concentrate on two early negotiation stages, characterised by minimal disclosure of information. Thus, the agents negotiating at these stages can be thought of as ``minimally intrusive''.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2, WP5]: This paper aims at studying interaction patterns in a negotiation scenario, defining protocols which we use as case studies in other publications [DALT2003torroni] and in some deliverables, such as D5 [D5], and singles out properties that we would like to study within WP5 [SOCS-roperties].

[UNIBO-DIFERRARA/Alberti/Alberti-FAMAS] Marco Alberti, Anna Ciampolini, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni, Logic Based Semantics for an Agent Communication Language. In Barbara Dunin-Keplicz and Rineke Verbrugge, editors, Proceedings of the International Workshop on Formal Approaches to Multi-Agent Systems (FAMAS), pages 21–36, Warsaw, Poland, April 12 2003.

Abstract: Agent communication is one of the key issues in multi-agent systems. Traditional interprocess communication formalisms are usually considered insufficient for this purpose because of their lack of expressiveness; thus, in most proposals for multi-agent architectures, an Agent Communication Language (ACL) is designed to provide for agent communication. However, a universally accepted standard for ACLs is still missing. Agent communication in open societies of heterogeneous agents poses requirements on ACLs semantics (formal syntax and semantics, declarativeness, verifiability, meaningfulness) which a \textit{social} approach seems to meet best. In this paper we propose a logic-based social approach for ACL semantics. We give a functional abstract model of societies and agents. Then we propose a formalism (deontic constraints, grounded on a computational logic framework) to express interaction protocols and give a social semantics to the behavior of agents, focusing on communicative acts. Finally, we sketch a prototypical implementation of deontic constraints exploiting the Constraint Handling Rules language.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2,WP3,WP4]: The paper presents an early version of Social Integrity Constraints (subject of WP2). It also introduces the computational mechanisms that have later been formalized as an Abductive Proof Procedure in WP3, and a prototype of the Social Compliance Verifier developed for WP4.

[UNIBO-DIFERRARA/Alberti/alberti03social-ceemas03] Marco Alberti, Anna Ciampolini, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni, A social ACL semantics by deontic constraints. In V. Marik, J. Müller, and M. Pechoucek, editors, Multi-Agent Systems and Applications III. Proceedings of the 3rd International Central and Eastern European Conference on Multi-Agent Systems, CEEMAS 2003, volume 2691 of Lecture Notes in Artificial Intelligence, pages 204-213, Prague, Czech Republic, June 16-18 2003. Springer-Verlag.

Abstract: In most proposals for multi-agent systems, an Agent Communication Language (ACL) is the formalism designed to express knowledge exchange among agents. However, a universally accepted standard for ACLs is still missing. Among the different approaches to the definition of ACL semantics, the \textit{social} approach seems the most appropriate to express semantics of communication in open societies of autonomous and heterogeneous agents. In this paper we propose a formalism (\textit{deontic constraints}) to express social ACL semantics, which can be grounded on a computational logic framework, thus allowing automatic verification of compliance by means of appropriate proof procedures. We also show how several common communication performatives can be defined by means of deontic constraints.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2]: The paper introduces a version of Social Integrity Constraints, focussing on the expressive power of the framework for semantics of communication and interaction protocols, also compared to that of other frameworks. Both the definition of Social Integrity Constraints and a comparison with related work were among the main tasks of WP2.

[UNIBO-DIFERRARA/Torroni/DALT2003torroni] Marco Alberti, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni, Modeling interactions using social integrity constraints: a resource sharing case study. In J. A. Leite, A. Omicini, L. Sterling, and Paolo Torroni, editors, Declarative Agent Languages and Technologies, First International Workshop, DALT 2003. Melbourne, Victoria, July 15th, 2003. Workshop Notes, pages 81–96, 2003.

Abstract: Computees are abstractions of the entities that populate global and open computing environments. The societies that they populate give an institutional meaning to their interactions and define the allowed interaction protocols. Social integrity constraints represent a powerful though simple formalism to express such protocols. Using social integrity constraints, it is possible to give a formal definition of concepts such as violation, fulfillment, and social expectation. This allows for the automatic verification of the social behaviour of computees. The aim of this paper is to show by a concrete example how the theoretical framework can be used in practical situations where computees can operate. The example that we choose is a resource exchange scenario.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2, WP5]: This paper draws from [IJCAI03-multistage], and it aims at showing the use of Social Integrity Constraints in a concrete application scenario. Its work has been used in some deliverables such as D5 [D5]. Some examples in the paper also aim at exploring some ideas about verification of properties, subject of WP5.

[UNIBO/Torroni/DALT2003notes] João A. Leite, Andrea Omicini, Leon Sterling, and Paolo Torroni, editors. Declarative Agent Languages and Technologies, First International Workshop, DALT 2003. Melbourne, Victoria, July 15th, 2003. Workshop Notes, pages x + 178, 2003.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1-WP6]: Declarative agent languages and technologies are in the core of SOCS. Several members of the SOCS consortium have been Program Committee members. The purpose of this workshop was to provide a forum to discuss state of the art technologies, which are related to the SOCS objectives in many respects. The proceedings also include some work done by SOCS members [DALT2003torroni] with respect to WP2, but the volume is indeed related to all SOCS workpackages.

[UNIBO-DIFERRARA-ICSTM/Torroni/AMAI-01] Anna Ciampolini, Evelina Lamma, Paola Mello, Francesca Toni, and Paolo Torroni. Co-operation and competition in ALIAS: a logic framework for agents that negotiate. Computational Logic in Multi-Agent Systems. Annals of Mathematics and Artificial Intelligence, 37(1–2):65–92, 2003.

Abstract: This paper presents ALIAS, an agent architecture based on intelligent logic agents, where the main form of agent reasoning is abduction. The system is particularly suited for solving problems where knowledge is incomplete, where agents may need to make reasonable hypotheses about the problem domain and other agents, and raised hypotheses have to be consistent for the overall set of agents. ALIAS agents are pro-active, exhibiting a goal-directed behavior, and autonomous, since each one can solve problems using its own private knowledge base. ALIAS agents are also social, because they are able to interact with other agents, in order to cooperatively solve problems. The co-ordination mechanisms are modeled by means of LAILA, a logic-based language which allows to express intra-agent reasoning and inter-agent co-ordination. As an application, we show how LAILA can be used to implement inter-agent dialogues, e.g., for negotiation. In particular, LAILA is well-suited to co-ordinate the process of negotiation aimed at exchanging resources between agents, thus allowing them to execute the plans to achieve their goals.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1, WP2, WP3]: This paper studies a form of coordination of reasoning which is alternative to the social approach of D5. It presents an operational framework based on abductive reasoning, which puts together the reasoning of a bunch of agents. A meta-language to define the reasoning activities of agents has been one option considered for WP1 and WP3, of which this paper can be considered background work.

[DIPISA/Bracciali/] Paolo Mancarella and Giacomo Terreni. An abductive proof procedure handling active rules. In A. Cappelli and F. Turini, eds., Proceedings of the 8th National Congress on Artificial Intelligence, AI*IA 2003, Pisa, Italy, September 23-26, 2003. LNAI 2829, pp. 105-117. Springer-Verlag.

Abstract: We present a simple, though powerful extension of an abductive proof procedure proposed in the literature, the so-called KM-procedure, which allows one to properly treat more general forms of integrity constraints than those handled by the original procedure. These constraints are viewed as active rules, and their treatment allows the integration of a limited form of forward reasoning within the basic, backward reasoning framework upon which the KM-procedure is based. We first provide some background on Abductive Logic Programming and the KM-procedure and then formally present the extension, named AKM-procedure. The usefulness of the extension is shown by means of some simple examples.

CONTRIBUTION TO SOCS WORKPACKAGES [WP3]: This paper presents advances in the theory of computational proof procedures for ALP.

[UNIBO-DIFERRARA/Alberti/D5-aiia] Marco Alberti, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni. An Abductive Computational Model for Open Societies. In A. Cappelli and F. Turini, eds., Proceedings of the 8th National Congress on Artificial Intelligence, AI*IA 2003, Pisa, Italy, September 23-26, 2003. LNAI 2829, pp. 287-299. Springer-Verlag.

Abstract: The focus of this work is on the interactions among (possibly heterogeneous) agents that form an open society, and on the definition of a computational logic-based architecture for agent interactions. We propose a model where the society defines the allowed interaction protocols, which determine the ``socially'' allowed agent interaction patterns. The semantics of protocols can be defined by means of social integrity constraints. The main advantages of this approach are in the design of societies of agents, and in the possibility to detect undesirable behaviour. In the paper, we present the model for societies ruled by protocols expressed as integrity constraints, and its declarative semantics. A sketch of the operational counterpart is also given.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2, WP3]: The paper shows the abductive interpretation of the social specification that we give for WP2; the abductive interpretation allows to implement compliance verification as an abductive proof procedure (augmented with the concept of fulfillment), which is the object of WP3.

[UNIBO/Milano/] A. Guerri and M. Milano, Exploring CP-IP based techniques for the bid evaluation in combinatorial auctions Proceedings of CP2003, Springer Verlag LNCS

Abstract: Combinatorial auctions are now an important e-commerce application where bidders can bid on combination of items. The problem of selecting the best bids that cover all items, i.e., the winner determination problem (WDP), is NP-hard. The time constrained variant of this problem, considered in this paper, is the bid evaluation problem where temporal windows and precedence constraints are associated to each task in the bid. Many approaches have been proposed for the winner determination problem, coming mainly from the Integer Programming (IP) community and recently from the multi-agent community, while the bid evaluation problem received less attention. Surprisingly, the Constraint Programming (CP) community has almost never considered neither of the problems, while we believe that CP solvers or hybrid CP-IP solvers can provide an important contribution to the field. In particular, as soon as temporal side constraints are introduced in the problem. In this paper, we propose different algorithms based on CP, IP and CP-IP. We show that even the simplest pure CP based approach outperforms existing approaches. Since none of the algorithms developed in this paper dominates all the others, they are good candidates for algorithm portfolio design. Therefore, we identified a set of instance-dependent structural features that allow to select the best class of algorithms to apply. An interesting result achieved is that we found a correspondence between the standard deviation of the clustering coefficient and the performances of IP or CP based algorithms. We believe this is the first step toward an automatic algorithm portfolio selection.

CONTRIBUTION TO SOCS WORKPACKAGES []

[ICSTM/Endriss/endriss-ijcai2003] Ulrich Endriss, Nicolas Maudet, Fariba Sadri, and Francesca Toni. Protocol Conformance for Logic-based Agents. In Proceedings of the 18th International Joint Conference on Artificial Intelligence (IJCAI-2003), Morgan Kaufmann Publishers, August 2003.

Abstract: An agent communication protocol specifies the "rules of encounter" governing a dialogue between agents in a multiagent system. In non-cooperative interactions(such as negotiation dialogues) occurring in open societies it is crucial that agents are equipped with proper means to check, and possibly enforce, conformance to protocols. We identify different levels of conformance (weak, exhaustive, and robust conformance) and explore how a specific class of logic-based agents can exploit a new representation formalism for communication protocols based on simple if-then rules in order to either check conformance a priori or enforce it at runtime.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2,WP5]: Communication protocols and their representation using computational logic are amongst the main themes in WP2 ("modelling interactions between computees") of SOCS and it is in this context that this paper was written. Additionally, our techniques for verifying conformance a priori on the basis of an agent's (or computee's) specification make an important contribution to WP5 ("verifiable properties of societies of computees").

[ICSTM/Endriss/endriss2003] Ulrich Endriss, Nicolas Maudet, Fariba Sadri, and Francesca Toni. Aspects of Protocol Conformance in Inter-agent Dialogue. In Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-2003), ACM Press, July 2003. Extended Abstract.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2,WP5]: This poster is a preliminary version of our paper presented at IJCAI-2003.

[ICSTM/Endriss/endriss-aamas2003] Ulrich Endriss, Nicolas Maudet, Fariba Sadri, and Francesca Toni. On Optimal Outcomes of Negotiations over Resources. In Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-2003), ACM Press, July 2003.

Abstract: We analyse scenarios in which self-interested agents negotiate with each other in order to agree on deals to exchange resources. We consider two variants of the framework, one where agents can use money to compensate other agents for disadvantageous deals, and one where this is not possible. In both cases, we analyse what types of deals are necessary and sufficient to guarantee an optimal outcome of negotiation. To assess whether a given allocation of resources should be considered optimal we borrow two concepts from welfare economics: maximal social welfare in the case of the framework with money and Pareto optimality in the case of the framework without money. We also show how conditions for optimal outcomes can change depending on properties of the utility functions used by agents to represent the values they ascribe to certain sets of resources.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1,WP2,WP5]: This paper is placed at the interface between WP1 ("a logic-based model for computees") and WP2 ("modelling interactions between computees") of SOCS by showing how specific choices made at the level of a single agent (or computee) can cause a particular behaviour to emerge at the level of society. Our results provide a theoretical analysis of the resource allocation problem in open societies, which has been identified as a central scenario of interest in SOCS and has also received much attention within the Global Computing initiative in general. The paper also provides the basis for our future work on the verification of welfare-related properties of societies of computees in WP5 ("verifiable properties of societies of computees").

[ICSTM/Endriss/EndrissEtAlMFI2003] Ulrich Endriss, Nicolas Maudet, Fariba Sadri, and Francesca Toni. Resource Allocation in Egalitarian Agent Societies. In Secondes Journées Francophones sur les Modèles Formels d'Interaction (MFI-2003), Cépaduès-Éditions, May 2003.

Abstract: We introduce the notion of an egalitarian agent society and study the problem of finding an optimal allocation of resources by means of negotiation amongst the agents inhabiting such a society.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1,WP2,WP5]: In this paper, we argue that the assumption, commonly made in the multiagent systems literature, that all agents are purely selfish and social welfare is only concerend with average utility is too restrictive for a range of interesting Global Computing applications. This notion of different agents or computees having different social attitudes and behaviour profiles is one of the central ideas developed in SOCS.

[DIFERRARA-UNIBO/Riguzzi/ngc-LamMelRigSto-2003] Evelina Lamma, Paola Mello, Fabrizio Riguzzi, Sergio Storari, Discovering Validation Rules from Micro-biological Data. New Generation Computing, Vol. 21 No. 2, Ohmsha and Springer Verlag, Tokyo, pp. 123-134, February 2003.

Abstract: A huge amount of data is daily collected from clinical microbiology laboratories. These data concern the resistance or susceptibility of bacteria to tested antibiotics. Almost all microbiology laboratories follow standard antibiotic testing guidelines which suggest antibiotic test execution methods and result interpretation and validation (among them, those annually published by NCCLS \cite{R2}\cite{R3}). Guidelines basically specify, for each species, the antibiotics to be tested, how to interpret the results of tests and a list of exceptions regarding particular antibiotic test results. Even if these standards are quite assessed, they do not consider peculiar features of a given hospital laboratory, which possibly influence the antimicrobial test results, and the further validation process. In order to improve and better tailor the validation process, we have applied knowledge discovery techniques, and data mining in particular, to microbiological data with the purpose of discovering new validation rules, not yet included in NCCLS guidelines, but considered plausible and correct by interviewed experts. In particular, we applied the knowledge discovery process in order to find (association) rules relating to each other the susceptibility or resistance of a bacterium to different antibiotics. This approach is not antithetic, but complementary to that based on NCCLS rules: it proved very effective in validating some of them, and also in extending that compendium. In this respect, the new discovered knowledge has lead microbiologists to be aware of new correlations among some antimicrobial test results, which were previously unnoticed. Last but not least, the new discovered rules, taking into account the history of the considered laboratory, are better tailored to the hospital situation, and this is very important since some resistances to antibiotics are specific to particular, local hospital environments.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1]: This work explores techniques of machine learning and knowledge revision that could have been useful for the single computee. Since the learning and knowledge revision capability of computees has been put aside at this point, this paper has currently a limited relevance to WP1.

[DIFERRARA/Riguzzi/ngc-LamRigPer-2003] Evelina Lamma, Luiz M. Pereira, Fabrizio Riguzzi, Belief Revision via Lamarckian Evolution. New Generation Computing, Vol. 21 No. 3, Ohmsha and Springer Verlag, Tokyo, pp. 247-275, May 2003.

Abstract: We present a system for performing belief revision in a multi-agent environment. The system is called GBR (Genetic Belief Revisor) and it is based on a genetic algorithm. In this setting, different individuals are exposed to different experiences. This may happen because the world surrounding an agent changes over time or because we allow agents exploring different parts of the world. The algorithm permits the exchange of chromosomes from different agents and combines two different evolution strategies, one based on Darwin's and the other on Lamarck's evolutionary theory. The algorithm therefore includes also a Lamarckian operator that changes the memes of an agent in order to improve their fitness. The operator is implemented by means of a belief revision procedure that, by tracing logical derivations, identifies the memes leading to contradiction. Moreover, the algorithm comprises a special crossover mechanism for memes in which a meme can be acquired from another agent only if the other agent has ``accessed'' the meme, i.e. if an application of the Lamarckian operator has read or modified the meme. Experiments have been performed on the $n$-queen problem and on a problem of digital circuit diagnosis. In the case of the $n$-queen problem, the addition of the Lamarckian operator in the single agent case improves the fitness of the best solution. In both cases the experiments show that the distribution of constraints, even if it may lead to a reduction of the fitness of the best solution, does not produce a significant reduction.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2]: Tthis work investigates an alternative form of communication among computees, namely communication by sharing genetic material. This line of research has been superseeded by the decision to adopt a symbolic communication language.

[UCY/Kakas/] A.C. Kakas and P. Moraitis. Argumentation based decision making for autonomous agents. In Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-2003), ACM Press, July 2003

Abstract: This paper presents an argumentation based framework to support the decision making of an agent within a modular architecture for agents. The proposed argumentation framework is dynamic, with arguments and their strength depending on the particular context that the agent finds himself, thus allowing the agent to adapt his decisions in a changing environment. In addition, in order to enable the agent to operate within an open environment where the available information may be incomplete we have integrated abduction within this argumentation framework. This is particular useful when the agent finds himself in a dilemma and hence needs additional information to resolve this. We have also developed, motivated by work in Cognitive Psychology, within the same framework an argumentation based personality theory for agents thus incorporating a dimension of individuality in the decisions of the agent.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1]: This work is relevant to WP1 for the task of goal decision of a computee, as specified in D4. It considers the case where the computee's goal decision knowledge base contains a personality theory. In such a theory goals are generated and selected according to a general theory of high-level needs that they address for the computee.

[UCY/Kakas/] A.C. Kakas and P. Moraitis. Agents Negotiating via Argumentation. Technical Report.

Abstract: In this paper, we study how argumentation can be used as a basis for negotiation between autonomous agents, where negotiation strategies and policies of the different negotiating parties are represented as argumentation theories within their knowledge. We propose an argumentation based negotiation protocol where offers by the negotiating parties are linked to different arguments that they can build according to their individual negotiation strategy. The protocol exploits the added flexibility that the argumentation based representation of strategies offers and is able to take into account the different roles of agents and context of interaction, where the strength of the arguments supporting an offer can depend on these factors. The agents can adapt their negotiation strategies and offers, as their environment changes, in particular during the course of the negotiation as they exchange information. In addition, using abduction alongside with argumentation, agents can find negotiating assumptions to support an argument for an offer, thus extending the negotiation object in order to help find an agreement. To illustrate further the advantages of the approach we also study how we can capture and extend negotiation strategies within other negotiation mechanisms, in particular the two well-known mechanisms of the English auction and the bargaining with multiple parties. These expose further the main advantages of modularity and flexibility, under changes, of our argumentation based representation of negotiation strategies and the adaptability it offers in a changing environment of negotiation.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1,WP2]: This work is relevant to WP1 in that it shows a flexible decision-making protocol for computees that extend the negotiation object by dealing appropriately with partial information. It is relevant to WP2 in that it also focuses on interactions among computees.

[UCY/Kakas/] N. Demetriou and A. Kakas. Argumentation with Abduction In Proceedings of the fourth Panhellenic Symposium on Logic, 2003.

Abstract: This paper presents a general approach to combining argumentation and abduction where the different uses of argumentation for preference reasoning and abduction for reasoning under incomplete information are synthesized together in an enhancing way. This integrated approach of argumentation and abduction can form the basis for encoding adaptable preference policies in the face of incomplete information from dynamic and evolving environments. The paper shows how this integration can be achieved within a suitable logic based framework and studies a simple computational model to capture the combined form of reasoning.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1]: This document reports on studies for identifying the computational counterpart of reasoning with cycle theories and the goal decision capability of a computee, as specified in deliverable D4. This is based on a computational model for the underlying framework of LPwNF (Logic Programming without Negation as Failure). We illustrate this general approach with examples in LPwNF. The proposed argumentation framework and its integration with abduction has been implemented in the Gorgias system.

[UCY/Kakas/] A.C. Kakas and L. Michael. On the Qualification problem and Elaboration Tolerance To appear in Common Sense, 2003.

Abstract: In this paper we study the qualification problem in theories of reasoning about actions and change and the link of this problem to properties of representation for expressing such theories. We examine the interaction of the qualification problem with the frame and ramification problems and show how an integrated solution to these problems can be developed where the frame persistence and constraint satisfaction qualify implicitly the action effect laws of the theory. We compare the two approaches of implicit and explicit qualification of the effects laws and argue that from the point of view of knowledge representation the former has better properties pertaining to elaboration tolerance.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1]: This work is directly relevant to the temporal reasoning capability of a computee, presented in deliverable D4, for its need to be able to recognize and deal with failing actions, so as to avoid obtaining inconsistencies. It provides representative examples illustrating failing actions and how such failing effects would interact with each other.

[UCY/Kakas/] Y. Dimopoulos, A.C. Kakas, L. Michael. Reasoning about Actions and Change in Answer Set Programming Submitted to LPNMR 2003.

Abstract: This paper studies computational issues related to the problem of reasoning about actions and change (RAC) by exploiting its link with the Answer Set Programming paradigm. It investigates how increasing the expressiveness of a RAC formalism so that it can capture the three major problems of frame, ramification and qualification, affects its computational complexity, and how a solution to these problems can be implemented within Answer Set Programming. Our study is carried out within the particular Language E. It establishes a link between Language E and Answer Set Programming by presenting encodings of different versions of this language into logic programs under the answer set semantics. This provides a computational realization of solutions to problems related to reasoning about actions and change, that can make use of the recent development of effective systems for Answer Set Programming. .

CONTRIBUTION TO SOCS WORKPACKAGES [WP3]: This work studies computational issues of the temporal reasoning capability of the computee and its possible computational models that are investigated in WP3.


2002

[UNIBO-ICSTM/Torroni/] F. Sadri, F. Toni, and P. Torroni, Resource reallocation via negotiation through abductive logic programming In Proc. JELIA 2002, Springer Verlag LNAI 2424, pp 419-431.

Abstract. In this paper we present a framework for agents negotiation based on abductive logic programming. The framework is based on an existing architecture for logic-based agents, and extends it by accommodating dialogues for negotiation. As an application of negotiating agents, we propose a resource-exchanging problem. The innovative contribution of this work is in the definition of an operational model, including an agent cycle and dialogue cycle, and in the results that apply in the general case of abductive agents and in the specific case of a class of agent systems.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1,WP2,WP5]: Use of abductive logic programming for representing the knowledge of agents; Use of abductive logic programming for representing the communication policies of agents; Use of abductive logic programming for representing dialogues for negotiation; Specification of cycles for agents; The resource reallocation scenario; Formal specification of properties; Formal verification of properties

[UNIBO-ICSTM/Torroni/] F. Sadri, F. Toni, and P. Torroni, A multi-stage negotiation architecture for sharing resources amongst logic-based agents Short paper. In: Proceedings of UKMAS, 2002

Abstract. In earlier work we proposed a framework for agents negotiating for resources. The framework was based on abductive logic programming. It was assumed that its missing resources would have to be acquired by the agent before his plan could be carried out, but there was no explicit reference to time windows and duration of actions. Furthermore it was assumed that once a resource was acquired by an agent it was his indefinitely. In this paper we relax these assumptions to provide a richer framework for negotiation that allows better sharing of resources. We allow agent plans to be partially ordered sets of activities specified within time windows, each activity requiring certain resources. We develop negotiation protocols and policies that allow agents to strike deals for exchange of resources for agreed time windows so that (non-consumable) resources can be shared, thus allowing solutions to a wider range of resource reallocation problems.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1,WP2,WP5]: Use of abductive logic programming for representing the knowledge of agents; Use of abductive logic programming for representing the communication policies of agents; Use of abductive logic programming for representing dialogues for negotiation; The resource reallocation scenario; Formal specification of properties; Formal verification of properties

[CITY-ICSTM/Toni/] F. Toni and K. Stathis, Access-as-you-need: A computational logic framework for accessing resources in artificial societies In Proc ESAW 02, International Workshop on Engineering Society in the Agent World.

Abstract. We investigate the application of abductive logic programming, an existing framework for knowledge representation and reasoning, for specifying the knowledge and behaviour of software agents that need to access resources in a global computing environment. The framework allows agents that need resources to join artificial societies where those resources are available. We show how to endow agents with the capability of becoming and ceasing to be members of societies, for different categories of artificial agent societies, and of requesting and being given or denied resources within societies. The strength of our formulation lies in combining the modelling and the computational properties of abductive logic programming for dealing with the issues arising in resource access within artificial agent societies.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1,WP2]: This work studies how to endow computational-logic based agents with the capability to reason about their own and others' movements amongst open, semi-open and semi-closed societies, while trying to access resources controlled by societies.

[DIFERRARA/Alberti/] M. Alberti and E. Lamma, Synthesis of Object Models from Partial Models: A CSP Perspective In ECAI 2002. Proceedings of the 15th European Conference on Artificial Intelligence. Frank van Harmelen editor. Lyon, (France), 21-26 July 2002. Pages 116-120, IOS Press.

Abstract: In this work we present an approach for the synthesis of object models (expressed as Constraint Satisfaction Problems, CSPs) from views or partial models (expressed, in their turn, as CSPs as well). The approach we propose is general enough to consider different types of features and relationships in the views. This is achieved by introducing the notion of model representation, where features, relationships and their domains are expressed. The (complete) model can be synthesized through a proper algorithm, which provides a labeling between the (complete) model and the partial models' components. The generated CSP representing the synthesized model must satisfy (or, better, entail) any constraint among features and any relationship occurring in each partial model. The framework is applied for synthesizing object models (i.e., CSP descriptions). We provide two basic approaches for synthesizing a minimal or a correct model, and we experiment them by considering some case studies in artificial vision.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1] The work is relevant to WP1 in that performing synthesis of different descriptions of the same object is a potentially useful reasoning capability for a computee; in particular, it can help to build a representation of an object from distinct sensing actions.

[DIFERRARA/Gavanelli/] @INPROCEEDINGS{cp-ai-or02, author = {Marco Gavanelli}, title = {An implementation of {Pareto} Optimality in {CLP(FD)}}, booktitle = {CP-AI-OR - International Workshop on Integration of AI and OR techniques in Constraint Programming for Combinatorial Optimisation Problems}, year = {2002}, editor = {Narendra Jussien and Fran\c{c}ois Laburthe}, address = {Le Croisic, France}, month = mar # " 25 -- 27", organization = {Ecole des Mines de Nantes}, pages = {49-64}, url = "http://cpaior.emn.fr:8000/", ps = "http://www.ing.unife.it/docenti/MarcoGavanelli/cp-ai-or02.ps.gz", }

Abstract. The Constraint Problems usually addressed fall into one of two models: the Constraint Satisfaction Problem (CSP) and the Constraint Optimization Problem (COP). However, in many real-life applications, more functions should be optimized at the same time, and solutions are ranked by means of a Partial Order. In problems where two or more functions should be optimized at the same time (Multi-Criteria Optimization, or Pareto optimality) the possible solutions of the CSP are ranked by means of a partial order. In this paper, we propose an algorithm for solving Pareto Optimality problems in CLP($FD$). The algorithm is complete and does not make any assumption on the structure of the constraints. It exploits Point Quad-Trees for the representation of the set of solutions, in order to access the data structure efficiently. In this paper, an implementation of the algorithm for multi-criteria optimization is provided in a CLP(FD) language. It is important for SOCS, as both the society and the computees are implemented on top of a CLP(FD) language, so they could employ the provided algorithm for computing the Pareto optimal solutions given a set of objective functions.

CONTRIBUTION TO SOCS WORKPACKAGES []

[DIFERRARA/Gavanelli/] @ARTICLE{AIxIAnotizie2002, author = {Marco Gavanelli}, title = {An Algorithm Computing the {Pareto} Frontier in Constraint Satisfaction Problems}, journal = {AI*IA Notizie}, year = {2002}, volume = {{XV}}, number = {2}, pages = {15--23}, month = Jun, url = "http://www.dsi.unifi.it/AIIA/indice2002.htm" }

Abstract. Real-life problems often exhibit a multi-criteria structure: user requirements are many and possibly conflicting. In combinatorial optimization, criteria are functions, ranging on the set of possible solutions. A widely used approach suggests to compute a weighted sum of the different criteria. Unluckily, deciding the weights beforehand is not always straightforward; moreover, the weighted sum approach often provides extreme solutions, while the user usually prefers balanced solutions. Since the set of Pareto optimal solutions can be huge and the algorithm needs to access them efficiently, we propose to arrange them in a suitable data structure, namely Point Quad-Trees. Experimental results show the effectiveness of the proposed method.", } In this paper, we provide an algorithm that computes the whole Pareto Frontier in Constraint Satisfaction Problems. The algorithm successfully employs spatial data structures (namely, Quad-Trees) to efficiently store the set of non-dominated solutions. Concerning SOCS, it can be used in the society to provide a set of expectations with a minimal set of violations. Another application could be the resource allocation (possibly, through negotiation). In such cases, distinguishing the Pareto optimal allocations can be important, possibly in order to provide some notions of fairness amongst computees.

CONTRIBUTION TO SOCS WORKPACKAGES []

[DIFERRARA-UNIBO/Gavanelli/] @InProceedings{FroCoS2002, author = "Marco Gavanelli and Evelina Lamma and Paola Mello and Michela Milano", title = "Exploiting constraints for domain managing in {CLP(FD)}", booktitle = "4th International Workshop on Frontiers of Combining Systems - FroCoS'2002", year = "2002", month = Apr # " 8-10", address = "Santa Margherita Ligure, Italy", publisher = "Springer Verlag", editor = "Alessandro Armando", series = "Lecture Notes in Artificial Intelligence", volume = "2309", url = "http://www.mrg.dist.unige.it/conferences/frocos2002/", pages = {177-191}, }

Abstract. Constraint Logic Programming languages on Finite Domains CLP(FD) provide a declarative framework for dealing with problems in Artificial Intelligence (AI). However, in many applications, domains are not known at the beginning of the computation and must be computed. The domain computation can be time-consuming, since elements can be retrieved through an expensive acquisition process from the outer world. In this paper, we introduce a CLP language that treats domains as first-class objects, and allows the definition of domains through constraints in a CLP(FD) environment. We define operations and properties on variables and domains. The language can be implemented on top of different CLP systems, exploiting thus different semantics for domains. We state the specifications that the employed system should provide, and we show that two different CLP systems (Conjunto and \{log\}) can be effectively used.", } This paper provides a language based on Computational Logics that exploits constraint propagation for the acquisition of information from the environment. This is important, among the others, for planning applications: planning is one of the most successful applications of constraint languages and an agent's planning activity must interact with sensors and refer to data taken from the outer world.

CONTRIBUTION TO SOCS WORKPACKAGES []

[DIFERRARA/Gavanelli/] @InProceedings{ecai2002, author = "Marco Gavanelli", title = "An Algorithm for Multi-Criteria Optimization in {CSPs}", booktitle = "ECAI 2002. Proceedings of the 15th European Conference on Artificial Intelligence", year = "2002", month = Jul # " 21-26", address = "Lyon, France", publisher = "IOS Press", editor = "Frank van Harmelen", url = "http://ecai2002.univ-lyon1.fr/", pages = {136--140}, }

Abstract: Constraint Satisfaction and Optimization are important areas of Artificial Intelligence. However, in many real-life applications, more functions should be optimized at the same time; the user needs to be provided a set of solutions and a posteriori choose the most preferable. In this paper, we propose an algorithm for solving Multi-Criteria Optimization problems in this setting. The algorithm is complete, i.e., it finds all the non-dominated solutions, and does not make any assumption on the structure of the constraints nor on the type of the objective functions. It exploits Point Quad-Trees for the representation of the non-dominated frontier, in order to efficiently access the data. We describe the implementation and give experimental results showing that our algorithm outperforms widely used methods. This paper provides an algorithm for multi-criteria optimization in Constraint Satisfaction Problems. The algorithm is based on the so-called Optimization NoGoods. The algorithm is complete, in the sense that it is able to provide the whole non-dominated frontier of Pareto-optimal solutions. Comparison with a widely used method is provided. This study is important from the society viewpoint. It could be important for the society to provide a set of expectations such that the violated ones are minimal, or a set which is minimal with respect to set inclusion.

CONTRIBUTION TO SOCS WORKPACKAGES []

[CITY/Stathis/] K. Stathis, O. deBruijn, S. Macedo: Living memory: agent based information management for connected local communities. In Journal of Interacting with Computers, vol 14(6), Dec. 2002.

Abstract: We investigate the application of multi-agent systems to develop intelligent information interfaces for connected communities, a class of computer applications aimed at enhancing the way people interact and socialise in geographically co-located communities such as neighbourhoods. In this context, we study the problem of providing effective information management in support of social interaction when a diverse range of computing devices is employed. The novelty of our approach is based on combining innovative interactive devices with a framework based on agent roles in order to support the effective flow of community-related content for the people of a given locality. In particular, we have integrated existing techniques for information retrieval and filtering with measures of content popularity, to ensure that documents in the community system are optimally available. After reporting on the potential presence of the system in the community, we report on the development of a framework for multi-agent systems in which agents provide a number of services aimed at facilitating personalised and location-dependent information access to members of the community. We also present a summary of the results of an expert evaluation of the information flow resulting from the communication between agents, and a user-evaluation of the information dissemination facilities provided by the system.

CONTRIBUTION TO SOCS WORKPACKAGES []

[CITY/Stathis/] Wenjin Lu and Kostas Stathis. Gameplan: Adversarial Planning in Multi-Agent Systems--A Preliminary Report Department of Computing, School of Informatics, City University, London {lue,~kostas}@soi.city.ac.uk

Abstract. We study the problem of adversarial planning in the context of multi-agent system environments. In this context we present Gameplan, an algorithm that takes into account the open and unpredictable nature of such environments. Unpredictability manifests itself here as follows: what an agent assumes to hold at one stage of its interaction with the environment may change as a consequence of the unpredictable, and possibly adversarial, actions of other agents in that environment; such actions take place at later stages of the interaction. Gameplan is based on Graphplan, a general purpose and efficient planner for STRIPS like domains, where a plan is a compact structure represented as a graph specifying the flow of properties holding as a result of various actions taking place in the environment. Like Graphplan, Gameplan has the property that useful information for constraining search can quickly be propagated through the graph as it is being built. Unlike Graphplan, however, Gameplan constructs the planning graph by labelling each action level with the agent who will eventually execute this action, while the solution extraction is adapted to one that can be handled by a conditional planer to deal with the adversarial and uncertain behaviours of other agents in the environment.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1, WP2]: The planning capability of agents is a main concern in the KGP model proposed in SOCS. This paper presents a preliminary research on the adversarial planning in multi-agetn system.

[ICSTM/Endriss/EndrissEtAlUKMAS2002-protocols] Ulrich Endriss, Nicolas Maudet, Fariba Sadri, and Francesca Toni. Communication Protocols for Logic-based Agents. In Proceedings of the 5th UK Workshop on Multiagent Systems (UKMAS-2002), December 2002. Extended Abstract.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2,WP5]: This workshop poster is a preliminary version of our paper presented at IJCAI-2003.

[ICSTM/Endriss/endriss2002] Ulrich Endriss, Nicolas Maudet, Fariba Sadri, and Francesca Toni. Conditions for Optimal Outcomes of Negotiations about Resources. In Proceedings of the 5th UK Workshop on Multiagent Systems (UKMAS-2002), December 2002.

Abstract: We analyse scenarios in which individually rational agents negotiate with each other in order to agree on deals to exchange resources. We consider two variants of the framework, one where agents can use money to compensate other agents for disadvantageous deals, and another one where this is not possible. In both cases, we analyse what types of deals are necessary and sufficient to guarantee an optimal outcome of negotiations. We also show how these conditions can change depending on properties of the utility functions used by agents to represent the values they ascribe to certain sets of resources.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1,WP2,WP5]: This workshop paper is a preliminary version of our paper presented at AAMAS-2003.

[DIPISA/Bracciali/] Bracciali A., Brogi A., Ferrari G. and Tuosto E. Security and Dynamic Compositions of Open Systems. In H.R. Arabnia editor, Proc. of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA02), pages 1372-1377, vol III. Las Vegas, NV, 2002, CSREA Press (ISBN 1-892512-89-0).

Abstract: Designing software by coordinating components is becoming a pervasive software development methodology. This practice of building (distributed) applications is currently supported by several industrial standards competing in the marketplace. Moreover, Internet facilitates the distributions of services to be embedded into applications. In this highly dynamic scenario, we discuss a methodology to formally describe the (behavioural) features of the single components and to reason about the properties of the assembled applications.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2]: This work investigates the problem of software compositions in terms of autonomous entities in a dynamic scenario. Such a general problem occurs in MAS architectures.

[DIPISA/Bracciali/] Baldan P., Bracciali A. and Bruni R. Bisimulation by Unification. In H. Kirchner, C. Ringeissen editors, Proc. 9th International Conference on Algebraic Methodology And Software Technology (AMAST'2002), pages 254-270. Reunion Island, 2002. Lecture Notes on Computer Science 2422, Springer.

Abstract: We propose a methodology for the analysis of open systems based on process calculi and bisimilarity. Open systems are seen as coordinators (terms with place-holders), that evolve when suitable components (closed terms) fill in their place-holders. The distinguishing feature of our approach is the definition of a symbolic operational semantics for coordinators that exploits spatial/modal formulae as labels of transitions and avoids the universal closure of coordinators wrt all components. Two kinds of bisimilarities are then defined, called strict and large, which differ in the way formulae are compared. Strict bisimilarity implies large bisimilarity which, in turn, implies the one based on universal closure. Moreover, for process calculi in suitable formats, we show how the symbolic semantics can be defined constructively, using unification. Our approach is illustrated on a toy process calculus with ccs-like communication within ambients.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2]: This work investigates the problem of software compositions in open systems, of whcih MAS architectures in general are a particular case.

[DIPISA/Bracciali/] J. J. Alferes, A. Brogi, J.A. Leite, L.M. Pereira. Evolving Logic Programs. In Proc. JELIA 02, 8th European Conference on Logics in AI, September 2002.

Abstract: Despite Logic Programming has often been considered not properly adequate for modeling dynamic changes in knowledge bases, we show in this paper how generalised logic programs can properly express knowledge base updates. We define a language, called EVOLP (after EVolving Logic Program), and provide it with a model-theoretic characterisation of the possible evolutions of EVOLP programs. Evolutions can be motivated both by internal updates as well as external updates, modeling the relations of a program with the environment where it is executed.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1,WP2]: The work proposes a logic-programming based approach to coping with evolving scenarios. This is a relevant aspect of the life of a computee and the society in which it operates.

[UCY/Kakas/] A.C. Kakas and P. Moraitis. Argumentative Agent Deliberation, Roles and Context In Proceedings of CLIMA02. Electronic Notes in Theoretical Computer Science Vol. 70, No 5, 2002.

Abstract: This paper presents an argumentation based framework to support an agent's deliberation process for drawing conclusions under a given policy. The argumentative policy of the agent is able to take into account the roles agents can have within a context pertaining to an environment of interaction. The framework uses roles and context to define policy preferences at different levels of deliberation allowing a modular representation of the agent's knowledge that avoids the need for explicit qualification of the agent's decision rules. We also employ a simple form of abduction to deal with the incompleteness and evolving nature of the agent's knowledge of the external environment and illustrate how an agent's self deliberation can affect the mode of interaction between agents. The high degree of modularity of the framework gives it a simple computational model in which the agent's deliberation can be naturally implemented.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1]: This work is directly relevant to WP1 for the task of goal decision, as specified in D4. It considers adaptability issues and enables the straighforward incorporation of roles in the behaviour of a computee.

[UCY/Kakas/] A.C. Kakas and P. Moraitis. Argumentative Deliberation for Autonomous Agents. In Proceedings of the ECAI02 workshop on Computational Models of Natural Argumentation, pp. 65-74, 2002.

Abstract: We have developed a general framework of argumentation and abduction within which the computee can represent in a flexible and modular way its various decision policies. This framework captures in a natural way roles and context and allows adaptability in the decision making of a computee in the face of a dynamically changing environment part of which maybe unknown to the computee. Within the same framework a computational personality theory for a computee is developed and shown how this affects its overall decision-making.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1]: This work is relevant to WP1 for the tasks of goal and plan decision of a computee and the definition of cycle theories of behaviour, as discussed in deliverable D4.

[UCY/Kakas/] A.C. Kakas and L. Michael. Modeling Complex Domains of Reasoning about Action and Change In Proceedings of the 9th International Workshop on Non-Monotonic Reasoning, NMR'2002, pp. 380-388, Toulouse, France, 2002.

Abstract: This paper studies the problem of modeling complex domains of actions and change within high-level action description languages. We investigate two main issues of concern: (a) can we represent complex domains that capture together different problems such as ramifications, non-determinism and concurrency of actions, at a high-level, close to the given natural ontology of the problem domain and (b) what features of such a representation can affect, and how, its computational behaviour. The paper describes the main problems faced in this representation task and presents the results of an empirical study, carried out through a series of controlled experiments, to analyze the computational performance of reasoning in these representations. The experiments compare different representations obtained, for example, by changing the basic ontology of the domain or by varying the degree of use of indirect effect laws through domain constraints. This study has helped to expose the main sources of computational difficulty in the reasoning and suggest some methodological guidelines for representing complex domains. Although our work has been carried out within one particular high-level description language, we believe that the results, especially those that relate to the problems of representation, are independent of the specific modeling language.

CONTRIBUTION TO SOCS WORKPACKAGES [WP1]: The paper examines problems related to modelling effectively large domains of reasoning about action and change. This work is directly relevant to the KGP model of a computee presented in deliverable D4 for (a) its need to maintain a view of (and reason about) its changing environment and (b) conditional planning with sensing actions when the computee has incomplete information about its environment.

[UNIBO/Milano/] M. Milano and A. Roli. On the relation between complete and incomplete search an informal discussion. UNIBO In Proc. CP-AI-OR'02, Le Croisic (France), March 2002.

Abstract: In this paper, we propose a variant of the LDS strategy, called Climbing Discrepancy Search (CDS) by underlying similarities and differences with a well known metaheuristic strategy called Variable Neighborhood Descent (VND). LDS in this setting can be seen as a bridge between tree and local search. We then argue that this process of comparing LDS with metaheuristics can lead to many different variants of LDS that can be used to exhaustively explore different neighborhoods and different regions of the search landscape. A discussion on open perspectives is presented.

CONTRIBUTION TO SOCS WORKPACKAGES []

[UNIBO/Roli/] A. Roli: Impact of structure in parallel local search for SAT. UNIB In Proc. SAT 2002, Cincinnati, Ohio, USA, May 2002.

Abstract: In this work we address the question of whether and how parallel local search, which simultaneously applies more than one local move, exhibits the criticality and parallelism phenomenon when performed on structured instances. We investigate the behavior of a parallel version of GSAT as a function of the number tau of parallel flips on structured SAT instances. First, we experimentally show that also for structured instances there exists an optimal value of parallelism which enables the algorithm to reach the optimal performance. Second, by analyzing the frequency of node degree of the graphs associated with the SAT instances, we observe that an asymmetric and not regular distribution strongly affects the algorithm performance with respect to tau. Finally, we provide a method that, given an instance, enables to set tau to the optimal value, so as to effectively apply multi-flip moves to boost local search.

CONTRIBUTION TO SOCS WORKPACKAGES []

[UNIBO-DIFERRARA/Ciampolini/] A. Ciampolini, E. Lamma, P. Mello, and P. Torroni. Coordinating the Safe Execution of Tasks in a Constrained Multi-Agent System.Tech. Rep. DEIS-LIA-01-009, Univ. of Bologna (Italy), 2001. LIA Series no. 53. Presented at AAMAS'02 Workshop on Distributed Constraint Reasoning (DCR'02). Also published as a short paper in Proc. AAMAS'02, Bologna (Italy), ACM, July 2002

Abstract: In this paper tackles the problem of ensuring that the execution of tasks in a constrained multi-agents setting is consistent with respect to its constraints. In order to do that, a formalism to express the coordination of tasks, (where the tasks represent services) is introduced. This formalism could be used in association with abstract specifications that express conditions on the services, and the agents are given a denotation in terms of service provided and associated conditions. The paper proves that the operational semantics is correct and complete with respect to the agent denotation.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2]: This paper introduces a logic-based way to coordinate and verificate agents behavior which is alternative to the social approach of D5.

[UNIBO-DIFERRARA/Ciampolini/] A. Ciampolini, E. Lamma, P. Mello, and P. Torroni. A Proof System for the Safe Execution of Tasks in Multi-Agent Systems In: Proceedings of the 8th European Conference on Logics in Artificial Intelligence (JELIA'02), Springer-Verlag LNAI 2424, 2002, pp. 14-26.

Abstract: The paper proposes an operational semantics based on a proof calculus for providing the consistent execution of tasks in a constrained multi-agent setting. The agent model presented is abstracted from previous work on abductive logic agents, and it is generalized in the paper. The contribution of this work is two-fold. Firstly, a formalism and an operational semantics is introduced, to express the way agents can coordinate their requests of services, and to verify that they do not collide with each other's conditions. Then, we show that such operational semantics can be used to verify the correct execution of multiple, possibly conflicting tasks, in dynamic and adaptive systems.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2]: The proposed proof represent a formal approach for the coordination and verification of agents behavior which could be considered a less general alternative to the social approach proposed in D5.

[UNIBO-DIFERRARA/Ciampolini/] A. Ciampolini, P. Mello, and S. Storari. Distributed medical diagnosis with abductive logic agents. UNIBO Tech. Rep. DEIS-LIA-02-003, Univ. of Bologna (Italy), 2002. LIA Series no. 56. Presented at ECAI'02 Workshop on Agents Applied in Health Care, July 2002.

Abstract: This work describes the application of a multi-agent system for medical diagnosis. This problem is faced by extending the ALIAS coordination mechanisms towards probabilistic abduction. In this way, several (possibly partial/multiple) diagnosis obtained by distinct medical agents can be merged into a final set of abductive diagnosis, each marked with a probability value that allows the selection of the most plausible one.

CONTRIBUTION TO SOCS WORKPACKAGES [WP2]: As in D5, agents interaction is grounded on an abductive mechanism, that guarantees the consistence of obtained diagnosis w.r.t some constraints. The association of probabilities to abducibles could be of interest for D5, as a way of extending the society in order to attribute some degree of uncertainty to events, e.g. in a possibly untrusted environment.

 

Back to : Main Page