ROLE
Author only
· Editor only
· Advisor only
· Other only
· All roles
AUTHOR'S COLLEAGUES
See all colleagues of this author
SUBJECT AREAS
See all subject areas
KEYWORDS
See all author supplied keywords
AUTHOR PROFILE PAGES
Project background
Author-Izer Service
BOOKMARK & SHARE
|
|
248 results found
Export Results:
bibtex
| endnote
| acmref
| csv
Result page:
1
2
3
4
5
6
7
8
9
10
>>
1
Tosca: operationalizing commitments over information protocols
August 2017
IJCAI'17: Proceedings of the 26th International Joint Conference on Artificial Intelligence
Publisher: AAAI Press
The notion of commitment is widely studied as a high-level abstraction for modeling multiagent interaction. An important challenge is supporting flexible decentralized enactments of commitment specifications. In this paper, we combine recent advances on specifying commitments and information protocols . Specifically, we contribute Tosca, a technique for automatically synthesizing information ...
2
Arnor: Modeling Social Intelligence via Norms to Engineer Privacy-Aware Personal Agents
May 2017
AAMAS '17: Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7, Downloads (12 Months): 35, Downloads (Overall): 35
Full text available:
 PDF
We seek to address the challenge of engineering socially intelligent personal agents that are privacy-aware. We propose Arnor, a method, including a metamodel based on social constructs. Arnor incorporates social norms and goes beyond existing agent-oriented software engineering (AOSE) methods by systematically capturing how a personal agent's actions influence the ...
Keywords:
personal agents, developer study, methodology, norms, social context
3
Splee: A Declarative Information-Based Language for Multiagent Interaction Protocols
May 2017
AAMAS '17: Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 18, Downloads (Overall): 18
Full text available:
 PDF
The Blindingly Simple Protocol Language (BSPL) is a novel information-based approach for specifying interaction protocols that can be enacted by agents in a fully decentralized manner via asynchronous messaging. We introduce Splee, an extension of BSPL. The extensions fall into two broad categories: multicast and roles. In Splee, a role ...
Keywords:
multicast, role bindings, safety, asynchronous communication, causality, meanings, decentralization, integrity, liveness
4
A service computing manifesto: the next 10 years
Athman Bouguettaya,
Munindar Singh,
Michael Huhns,
Quan Z. Sheng,
Hai Dong,
Qi Yu,
Azadeh Ghari Neiat,
Sajib Mistry,
Boualem Benatallah,
Brahim Medjahed,
Mourad Ouzzani,
Fabio Casati,
Xumin Liu,
Hongbing Wang,
Dimitrios Georgakopoulos,
Liang Chen,
Surya Nepal,
Zaki Malik,
Abdelkarim Erradi,
Yan Wang,
Brian Blake,
Schahram Dustdar,
Frank Leymann,
Michael Papazoglou
March 2017
Communications of the ACM: Volume 60 Issue 4, April 2017
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 102, Downloads (12 Months): 1,429, Downloads (Overall): 1,429
Full text available:
Html  PDF
Mapping out the challenges and strategies for the widespread adoption of service computing.
5
Sharing Policies in Multiuser Privacy Scenarios: Incorporating Context, Preferences, and Arguments in Decision Making
March 2017
ACM Transactions on Computer-Human Interaction (TOCHI): Volume 24 Issue 1, March 2017
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 14, Downloads (12 Months): 166, Downloads (Overall): 166
Full text available:
 PDF
Social network services (SNSs) enable users to conveniently share personal information. Often, the information shared concerns other people, especially other members of the SNS. In such situations, two or more people can have conflicting privacy preferences; thus, an appropriate sharing policy may not be apparent. We identify such situations as ...
Keywords:
Privacy, argumentation, social media, crowdsourcing, multiuser
6
Privacy Risks in Intelligent User Interfaces
November 2016
IEEE Internet Computing: Volume 20 Issue 6, November 2016
Publisher: IEEE Educational Activities Department
Intelligent user interfaces (in games, for example) provide opportunities for producing a high-quality, contextually relevant user experience. However, they also raise the specter of privacy violations. The authors review some of the ways in which user interfaces could glean a users private information; then the authors highlight the risks therein, ...
7
DIGS: A Framework for Discovering Goals for Security Requirements Engineering
September 2016
ESEM '16: Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 8, Downloads (12 Months): 105, Downloads (Overall): 105
Full text available:
 PDF
Context: The security goals of a software system provide a foundation for security requirements engineering. Identifying security goals is a process of iteration and refinement, leveraging the knowledge and expertise of the analyst to secure not only the core functionality but the security mechanisms as well. Moreover, a comprehensive security ...
Keywords:
Security goals, controlled experiment, security requirements
8
Toward a normative approach for forensicability
April 2016
HotSos '16: Proceedings of the Symposium and Bootcamp on the Science of Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3, Downloads (12 Months): 23, Downloads (Overall): 29
Full text available:
 PDF
Sociotechnical systems (STSs), where users interact with software components, support automated logging, i.e., what a user has performed in the system. However, most systems do not implement automated processes for inspecting the logs when a misuse happens. Deciding what needs to be logged is crucial as excessive amounts of logs ...
Keywords:
social norms, requirements, sociotechnical systems, security, forensic logging
9
Norms as a basis for governing sociotechnical systems
July 2015
IJCAI'15: Proceedings of the 24th International Conference on Artificial Intelligence
Publisher: AAAI Press
We understand a sociotechnical system as a microsociety in which autonomous parties interact with and about technical objects. We define governance as the administration of such a system by its participants. We develop an approach for governance based on a computational representation of norms. Our approach has the benefit of ...
10
Composing and verifying commitment-based multiagent protocols
July 2015
IJCAI'15: Proceedings of the 24th International Conference on Artificial Intelligence
Publisher: AAAI Press
We consider the design and enactment of multi-agent protocols that describe collaboration using "normative" or "social" abstractions, specifically, commitments. A (multiagent) protocol defines the relevant social states and how they progress; each participant maintains a local projection of these states and acts accordingly. Protocols expose two important challenges: (1) how ...
11
Muon: designing multiagent communication protocols from interaction scenarios
July 2015
Autonomous Agents and Multi-Agent Systems: Volume 29 Issue 4, July 2015
Publisher: Kluwer Academic Publishers
Designing a suitable communication protocol is a key challenge in engineering a multiagent system. This paper proposes Muon, an approach that begins from representative samples of interactions or scenarios. Muon identifies key semantic structures and patterns based on (social) commitments to formally analyze the scenarios and offers a methodology for ...
Keywords:
Commitments, Interactions, Dooley graphs, Protocols
12
Platys: An Active Learning Framework for Place-Aware Application Development and Its Evaluation
May 2015
ACM Transactions on Software Engineering and Methodology (TOSEM): Volume 24 Issue 3, May 2015
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 7, Downloads (12 Months): 75, Downloads (Overall): 218
Full text available:
 PDF
We introduce a high-level abstraction of location called place . A place derives its meaning from a user's physical space, activities, or social context. In this manner, place can facilitate improved user experience compared to the traditional representation of location, which is spatial coordinates. We propose the Platys framework as ...
Keywords:
privacy, usability, place recognition, semi-supervised learning, location-aware, middleware, Mobile application development, active learning, context-aware, place-aware
13
Generalized Commitment Alignment
May 2015
AAMAS '15: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 3, Downloads (12 Months): 17, Downloads (Overall): 28
Full text available:
 PDF
The interoperability of interacting components means that their expectations of each other remain in agreement. A commitment captures what one agent (its creditor) may expect from another agent (its debtor). Chopra and Singh (C&S) motivate commitment alignment as a meaning-based form of interoperation and show how to ensure alignment among ...
Keywords:
interoperability, commitments, protocols, transactions
14
Cybersecurity as an Application Domain for Multiagent Systems
May 2015
AAMAS '15: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 17, Downloads (12 Months): 98, Downloads (Overall): 180
Full text available:
 PDF
The science of cybersecurity has recently been garnering much attention among researchers and practitioners dissatisfied with the ad hoc nature of much of the existing work on cybersecurity. Cybersecurity offers a great opportunity for multiagent systems research. We motivate cybersecurity as an application area for multiagent systems with an emphasis ...
Keywords:
cybersecurity, trust, organizations, norms
15
Cupid: commitments in relational algebra
January 2015
AAAI'15: Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence
Publisher: AAAI Press
We propose Cupid, a language for specifying commitments that supports their information-centric aspects, and offers crucial benefits. One, Cupid is first-order, enabling a systematic treatment of commitment instances. Two, Cupid supports features needed for real-world scenarios such as deadlines, nested commitments, and complex event expressions for capturing the lifecycle of ...
16
Exploiting sentiment homophily for link prediction
October 2014
RecSys '14: Proceedings of the 8th ACM Conference on Recommender systems
Publisher: ACM
Bibliometrics:
Citation Count: 11
Downloads (6 Weeks): 3, Downloads (12 Months): 71, Downloads (Overall): 602
Full text available:
 PDF
Link prediction on social media is an important problem for recommendation systems. Understanding the interplay of users' sentiments and social relationships can be potentially valuable. Specifically, we study how to exploit sentiment homophily for link prediction. We evaluate our approach on a dataset gathered fro Twitter that consists of tweets ...
Keywords:
social media, topic affiliation, link prediction, social networks, sentiment analysis
17
The science of security: introduction from the perspective of secure collaboration
May 2014
ACySE '14: Proceedings of the 1st International Workshop on Agents and CyberSecurity
Publisher: ACM
Despite sustained research effort in security, current security practice conveys a decidedly ad hoc flavor---find a bug; patch it; find the next bug; and so on. This methodology is sometimes termed engineering , using the term in the narrow sense of developing solutions to specific problems. The past few years ...
Keywords:
collaboration, science of security, security ecosystem
18
Xipho: extending tropos to engineer context-aware personal agents
May 2014
AAMAS '14: Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 5, Downloads (12 Months): 12, Downloads (Overall): 57
Full text available:
 PDF
We introduce Xipho, an agent-oriented methodology for engineering context-aware personal agents (CPAs). Xipho extends Tropos to support CPA development. Xipho's steps span a CPA's requirements acquisition, design, and implementation. Importantly, we treat context as a cognitive notion and systematically relate it to other cognitive notions such as goals and plans. ...
Keywords:
context, methodology, tropos, personal agent
19
Extracting normative relationships from business contracts
May 2014
AAMAS '14: Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 5, Downloads (12 Months): 24, Downloads (Overall): 74
Full text available:
 PDF
The normative concepts offer a principled basis for engineering flexible multiagent systems for business and other cross-organizational settings. However, producing suitable specifications is nontrivial: the difficulty is an obstacle to the adoption of multiagent systems in industry. This paper considers normative relationships of six main types, namely, commitments (both practical ...
Keywords:
agent-oriented software requirements, norms
20
Platys: a framework for supporting context-aware personal agents
May 2014
AAMAS '14: Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5, Downloads (12 Months): 13, Downloads (Overall): 44
Full text available:
 PDF
A context-aware personal agent (CPA) adapts to the changing contexts of its user. Platys is an agent-oriented software engineering (AOSE) framework that supports the development and execution of CPAs. Specifically, the framework (1) facilitates modeling a CPA via cognitive constructs, simplifying development, and (2) delegates the concerns of context elicitation ...
Keywords:
middleware, personal agent, context
|
|