Munindar P. Singh
Munindar P. Singh

homepage
singhatncsu.edu

  Affiliation history
· University of Texas at Austin
· Microelectronics Computer Technology Corporation
· North Carolina State University
Bibliometrics: publication history
Average citations per article14.07
Citation Count3,475
Publication count247
Publication years1990-2017
Available for download85
Average downloads per article425.34
Downloads (cumulative)36,154
Downloads (12 Months)3,105
Downloads (6 Weeks)433
Professional ACM Member
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas

KEYWORDS
See all author supplied keywords


AUTHOR PROFILE PAGES
Project background Author-Izer logoAuthor-Izer Service

BOOKMARK & SHARE


248 results found Export Results: bibtex | endnote | acmref | csv

Result 1 – 20 of 248
Result page: 1 2 3 4 5 6 7 8 9 10 >>

Sort by:

1
Tosca: operationalizing commitments over information protocols
Thomas C. King, Akin Günay, Amit K. Chopra, Munindar P. Singh
August 2017 IJCAI'17: Proceedings of the 26th International Joint Conference on Artificial Intelligence
Publisher: AAAI Press
Bibliometrics:
Citation Count: 0

The notion of commitment is widely studied as a high-level abstraction for modeling multiagent interaction. An important challenge is supporting flexible decentralized enactments of commitment specifications. In this paper, we combine recent advances on specifying commitments and information protocols . Specifically, we contribute Tosca, a technique for automatically synthesizing information ...

2
Arnor: Modeling Social Intelligence via Norms to Engineer Privacy-Aware Personal Agents
Nirav Ajmeri, Pradeep K. Murukannaiah, Hui Guo, Munindar P. Singh
May 2017 AAMAS '17: Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 35,   Downloads (Overall): 35

Full text available: PDFPDF
We seek to address the challenge of engineering socially intelligent personal agents that are privacy-aware. We propose Arnor, a method, including a metamodel based on social constructs. Arnor incorporates social norms and goes beyond existing agent-oriented software engineering (AOSE) methods by systematically capturing how a personal agent's actions influence the ...
Keywords: personal agents, developer study, methodology, norms, social context

3
Splee: A Declarative Information-Based Language for Multiagent Interaction Protocols
Amit K. Chopra, Samuel H. Christie V., Munindar P. Singh
May 2017 AAMAS '17: Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 18,   Downloads (Overall): 18

Full text available: PDFPDF
The Blindingly Simple Protocol Language (BSPL) is a novel information-based approach for specifying interaction protocols that can be enacted by agents in a fully decentralized manner via asynchronous messaging. We introduce Splee, an extension of BSPL. The extensions fall into two broad categories: multicast and roles. In Splee, a role ...
Keywords: multicast, role bindings, safety, asynchronous communication, causality, meanings, decentralization, integrity, liveness

4 published by ACM
A service computing manifesto: the next 10 years
Athman Bouguettaya, Munindar Singh, Michael Huhns, Quan Z. Sheng, Hai Dong, Qi Yu, Azadeh Ghari Neiat, Sajib Mistry, Boualem Benatallah, Brahim Medjahed, Mourad Ouzzani, Fabio Casati, Xumin Liu, Hongbing Wang, Dimitrios Georgakopoulos, Liang Chen, Surya Nepal, Zaki Malik, Abdelkarim Erradi, Yan Wang, Brian Blake, Schahram Dustdar, Frank Leymann, Michael Papazoglou
March 2017 Communications of the ACM: Volume 60 Issue 4, April 2017
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 102,   Downloads (12 Months): 1,429,   Downloads (Overall): 1,429

Full text available: HtmlHtml  PDFPDF
Mapping out the challenges and strategies for the widespread adoption of service computing.

5 published by ACM
Sharing Policies in Multiuser Privacy Scenarios: Incorporating Context, Preferences, and Arguments in Decision Making
Ricard L. Fogues, Pradeep K. Murukannaiah, Jose M. Such, Munindar P. Singh
March 2017 ACM Transactions on Computer-Human Interaction (TOCHI): Volume 24 Issue 1, March 2017
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 14,   Downloads (12 Months): 166,   Downloads (Overall): 166

Full text available: PDFPDF
Social network services (SNSs) enable users to conveniently share personal information. Often, the information shared concerns other people, especially other members of the SNS. In such situations, two or more people can have conflicting privacy preferences; thus, an appropriate sharing policy may not be apparent. We identify such situations as ...
Keywords: Privacy, argumentation, social media, crowdsourcing, multiuser

6
Privacy Risks in Intelligent User Interfaces
Christopher J. Hazard, Munindar P. Singh
November 2016 IEEE Internet Computing: Volume 20 Issue 6, November 2016
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

Intelligent user interfaces (in games, for example) provide opportunities for producing a high-quality, contextually relevant user experience. However, they also raise the specter of privacy violations. The authors review some of the ways in which user interfaces could glean a users private information; then the authors highlight the risks therein, ...

7 published by ACM
DIGS: A Framework for Discovering Goals for Security Requirements Engineering
Maria Riaz, Jonathan Stallings, Munindar P. Singh, John Slankas, Laurie Williams
September 2016 ESEM '16: Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 8,   Downloads (12 Months): 105,   Downloads (Overall): 105

Full text available: PDFPDF
Context: The security goals of a software system provide a foundation for security requirements engineering. Identifying security goals is a process of iteration and refinement, leveraging the knowledge and expertise of the analyst to secure not only the core functionality but the security mechanisms as well. Moreover, a comprehensive security ...
Keywords: Security goals, controlled experiment, security requirements

8 published by ACM
Toward a normative approach for forensicability
April 2016 HotSos '16: Proceedings of the Symposium and Bootcamp on the Science of Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 23,   Downloads (Overall): 29

Full text available: PDFPDF
Sociotechnical systems (STSs), where users interact with software components, support automated logging, i.e., what a user has performed in the system. However, most systems do not implement automated processes for inspecting the logs when a misuse happens. Deciding what needs to be logged is crucial as excessive amounts of logs ...
Keywords: social norms, requirements, sociotechnical systems, security, forensic logging

9
Norms as a basis for governing sociotechnical systems
July 2015 IJCAI'15: Proceedings of the 24th International Conference on Artificial Intelligence
Publisher: AAAI Press
Bibliometrics:
Citation Count: 0

We understand a sociotechnical system as a microsociety in which autonomous parties interact with and about technical objects. We define governance as the administration of such a system by its participants. We develop an approach for governance based on a computational representation of norms. Our approach has the benefit of ...

10
Composing and verifying commitment-based multiagent protocols
Matteo Baldoni, Cristina Baroglio, Amit K. Chopra, Munindar P. Singh
July 2015 IJCAI'15: Proceedings of the 24th International Conference on Artificial Intelligence
Publisher: AAAI Press
Bibliometrics:
Citation Count: 0

We consider the design and enactment of multi-agent protocols that describe collaboration using "normative" or "social" abstractions, specifically, commitments. A (multiagent) protocol defines the relevant social states and how they progress; each participant maintains a local projection of these states and acts accordingly. Protocols expose two important challenges: (1) how ...

11
Muon: designing multiagent communication protocols from interaction scenarios
Anup K. Kalia, Munindar P. Singh
July 2015 Autonomous Agents and Multi-Agent Systems: Volume 29 Issue 4, July 2015
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 3

Designing a suitable communication protocol is a key challenge in engineering a multiagent system. This paper proposes Muon, an approach that begins from representative samples of interactions or scenarios. Muon identifies key semantic structures and patterns based on (social) commitments to formally analyze the scenarios and offers a methodology for ...
Keywords: Commitments, Interactions, Dooley graphs, Protocols

12 published by ACM
Platys: An Active Learning Framework for Place-Aware Application Development and Its Evaluation
Pradeep K. Murukannaiah, Munindar P. Singh
May 2015 ACM Transactions on Software Engineering and Methodology (TOSEM): Volume 24 Issue 3, May 2015
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 7,   Downloads (12 Months): 75,   Downloads (Overall): 218

Full text available: PDFPDF
We introduce a high-level abstraction of location called place . A place derives its meaning from a user's physical space, activities, or social context. In this manner, place can facilitate improved user experience compared to the traditional representation of location, which is spatial coordinates. We propose the Platys framework as ...
Keywords: privacy, usability, place recognition, semi-supervised learning, location-aware, middleware, Mobile application development, active learning, context-aware, place-aware

13
Generalized Commitment Alignment
Amit K. Chopra, Munindar P. Singh
May 2015 AAMAS '15: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 3,   Downloads (12 Months): 17,   Downloads (Overall): 28

Full text available: PDFPDF
The interoperability of interacting components means that their expectations of each other remain in agreement. A commitment captures what one agent (its creditor) may expect from another agent (its debtor). Chopra and Singh (C&S) motivate commitment alignment as a meaning-based form of interoperation and show how to ensure alignment among ...
Keywords: interoperability, commitments, protocols, transactions

14
Cybersecurity as an Application Domain for Multiagent Systems
May 2015 AAMAS '15: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 17,   Downloads (12 Months): 98,   Downloads (Overall): 180

Full text available: PDFPDF
The science of cybersecurity has recently been garnering much attention among researchers and practitioners dissatisfied with the ad hoc nature of much of the existing work on cybersecurity. Cybersecurity offers a great opportunity for multiagent systems research. We motivate cybersecurity as an application area for multiagent systems with an emphasis ...
Keywords: cybersecurity, trust, organizations, norms

15
Cupid: commitments in relational algebra
Amit K. Chopra, Munindar P. Singh
January 2015 AAAI'15: Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence
Publisher: AAAI Press
Bibliometrics:
Citation Count: 5

We propose Cupid, a language for specifying commitments that supports their information-centric aspects, and offers crucial benefits. One, Cupid is first-order, enabling a systematic treatment of commitment instances. Two, Cupid supports features needed for real-world scenarios such as deadlines, nested commitments, and complex event expressions for capturing the lifecycle of ...

16 published by ACM
Exploiting sentiment homophily for link prediction
Guangchao Yuan, Pradeep K. Murukannaiah, Zhe Zhang, Munindar P. Singh
October 2014 RecSys '14: Proceedings of the 8th ACM Conference on Recommender systems
Publisher: ACM
Bibliometrics:
Citation Count: 11
Downloads (6 Weeks): 3,   Downloads (12 Months): 71,   Downloads (Overall): 602

Full text available: PDFPDF
Link prediction on social media is an important problem for recommendation systems. Understanding the interplay of users' sentiments and social relationships can be potentially valuable. Specifically, we study how to exploit sentiment homophily for link prediction. We evaluate our approach on a dataset gathered fro Twitter that consists of tweets ...
Keywords: social media, topic affiliation, link prediction, social networks, sentiment analysis

17 published by ACM
The science of security: introduction from the perspective of secure collaboration
May 2014 ACySE '14: Proceedings of the 1st International Workshop on Agents and CyberSecurity
Publisher: ACM
Bibliometrics:
Citation Count: 0

Despite sustained research effort in security, current security practice conveys a decidedly ad hoc flavor---find a bug; patch it; find the next bug; and so on. This methodology is sometimes termed engineering , using the term in the narrow sense of developing solutions to specific problems. The past few years ...
Keywords: collaboration, science of security, security ecosystem

18
Xipho: extending tropos to engineer context-aware personal agents
Pradeep K. Murukannaiah, Munindar P. Singh
May 2014 AAMAS '14: Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 5,   Downloads (12 Months): 12,   Downloads (Overall): 57

Full text available: PDFPDF
We introduce Xipho, an agent-oriented methodology for engineering context-aware personal agents (CPAs). Xipho extends Tropos to support CPA development. Xipho's steps span a CPA's requirements acquisition, design, and implementation. Importantly, we treat context as a cognitive notion and systematically relate it to other cognitive notions such as goals and plans. ...
Keywords: context, methodology, tropos, personal agent

19
Extracting normative relationships from business contracts
Xibin Gao, Munindar P. Singh
May 2014 AAMAS '14: Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 5,   Downloads (12 Months): 24,   Downloads (Overall): 74

Full text available: PDFPDF
The normative concepts offer a principled basis for engineering flexible multiagent systems for business and other cross-organizational settings. However, producing suitable specifications is nontrivial: the difficulty is an obstacle to the adoption of multiagent systems in industry. This paper considers normative relationships of six main types, namely, commitments (both practical ...
Keywords: agent-oriented software requirements, norms

20
Platys: a framework for supporting context-aware personal agents
Pradeep K. Murukannaiah, Ricard Fogues, Munindar P. Singh
May 2014 AAMAS '14: Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 13,   Downloads (Overall): 44

Full text available: PDFPDF
A context-aware personal agent (CPA) adapts to the changing contexts of its user. Platys is an agent-oriented software engineering (AOSE) framework that supports the development and execution of CPAs. Specifically, the framework (1) facilitates modeling a CPA via cognitive constructs, simplifying development, and (2) delegates the concerns of context elicitation ...
Keywords: middleware, personal agent, context



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us