# Jose M. Vidal's Publications.

1. . Network-Impact of Platoon Size and Penetration at City-Scale. In Proceedings of the IEEE Green Energy and Smart Systems Conference . 2021.
2. . Ad Hoc Vehicle Platoon Formation. In Proceedings of the IEEE SouthEastCon. 2019.
Abstract: Road traffic is something most people experience daily. Traffic congestion is something everyone involved seeks to avoid, but often cannot. There are many facets of research seeking to alleviate or solve traffic problems. Platooning is a method that could help. Platooning is a technique where two or more cars drive in close proximity, one behind the other. To date, platoon formation research has largely focused on centrally orchestrated planning. Allowing dynamic formation of platoons seems a natural means to increase adoption and participation, but a standard way of negotiating the platoon is needed. This paper defines an Ad Hoc Platoon formation game that meets that need and evaluates potential strategies players could employ.
3. . Wikitheoria: A Computational Framework for Parsimonious Sociology Theory Construction. In Proceedings of 7th ACIS International Conference on Applied Computing & Information Technology (ACIT). 2019.
Abstract: In the social sciences, theory construction refers to the research process of building testable scientific theories to explain and predict observed phenomena in the natural world. Terms represent the theories’ concepts or ideas and their meanings are explicated in their definitions. The principle of parsimony, an important criterion for evaluating the quality of theories (e.g., as exemplified by Occam’s Razor) mandates that we minimize the number of definitions (terms) used in a given theory. Conventional methods for parsimony analysis in theory construction are based on the heuristic approaches. However, it is not always easy for young researchers to understand the theoretical work in a given area because of the problem of “tacit knowledge”, which often makes results lack coherence and logical integrity. Therefore, we propose a generic knowledge aggregation framework to facilitate the parsimonious approach of theory construction with a cloud-based theory modularization platform and semantic-based algorithms to minimize the number of definitions. The proposed approach is demonstrated and evaluated using the modularized theories from the database and sociological definitions retrieved from the system lexicon and sociological literature. The experiment results showed that the proposed approach achieves the precision of 82%, recall of 82% and accuracy of 81.69%. This study proves the effectiveness of using cloud-based knowledge aggregation system and semantic analysis models for promoting the parsimonious sociology theory construction.
4. . SOREC: A Semantic Content-based Recommendation System for Parsimonious Sociology Theory Construction. In Proceedings of IEEE BigDataService. 2019.
Abstract: Theory construction is the process of formulating scientific theories with reference to explicit logical and semantic criteria. Definitions and associated terms are essential components of the theory, in which parsimony is a crucial criterion for theory evaluation. The present work offers a novel semantic content-based recommendation system with supervised machine learning model for theoretical parsimony evaluation by checking the semantic consistency of definitions while constructing theories. Specifically, we evaluate the XGBoost tree-based classifier with the combination of 15 low-level features and 11 high-level features on our dataset. A sociologist annotated in-house dataset consisting of 2, 235 definition pairs drawn from the sociological literature is used for evaluating the proposed methods. The experiment results showed that the proposed system achieves 86.16% accuracy, 84.42% F-measure and 86% precision.
5. . Towards Parsimonious Sociology Theory Construction with Neural Embeddings and Semantic Analysis. In Proceedings of the ISSAT International Conference on Data Science and Intelligent Systems. 2019.
6. . Assessing operating room turnover time via the use of mobile application. mHealth. 4 (5) 2018.
10.21037/mhealth.2018.05.03
Abstract: Background: Improving operating room (OR) utilization is crucial to hospitals. This study examines the effectiveness of a mobile application co-developed with hospital staff to track OR turnover time (TOT). Methods: An Android-based app, named ORTimer, was used by staff in two OR units (GI-Lab and D-Core) of Greenville Memorial Hospital (GMH) in South Carolina. The staff used the app to record milestones and note delay reasons (if applicable). A total of 1,782 turnover observations from the GI-Lab and 694 turnover observations from the D-Core were collected for the study. Using data collected from the app and additional information from GMH’s electronic medical record system, a two-sample proportionality test was conducted to test the hypothesis that the use of the app improved OR turnover performance (i.e., the TOT is equal to or less than the allotted time). Results: The result of the hypothesis test indicates that a higher percentage of observations in the GI-Lab and D-Core met their turnover target time when the ORTimer app was used. Additionally, multiple regression analysis was used to identify significant factors that contribute to prolonged OR TOT and to estimate their impacts. Conclusions: The app serves as both a visual management tool as well as a TOT data collection tool. By identifying barriers to the on-time completion of the turnaround, the app allows for continuous improvement of the turnover process.
7. . To Read or To Do? That’s The Task. In Proceedings of the 14th International Conference on Data Science (ICDATA). 2018.
Abstract: This research studies the problem of email overload and proposes a system that automatically detects whether the email is “to read” or “to do”. The goal of our research is to test if we could automate both the features extraction and sentence classification phases by using word embedding and a deep learning model that consist of CNN and LSTM. We use word embeddings, trained on the entire Enron Email dataset, to represent the input. Then, we use a convolutional layer to capture local tri-gram features from the input, followed by a LSTononM layer to consider the meaning of a given feature (tri-grams) with respect to some “memory” of words that could occur much earlier in the sentence. We conduct experiments using several variations of model architectures with no handcrafted features. We evaluate the results on a subset of Enron Email Dataset. Our system works on the sentence level and is able to detect whether the sentence contains an intent or a delivery acts with an accuracy of 89%.
8. . To Read or To Do? That's The Task: Using Transfer Learning to Detect the Intent of an Email. In Proceedings of the International Conference on Computational Science and Computational Intelligence. 2018.
9. . Toward Detecting Accidents with Already Available Passive Traffic Information. In The 7th IEEE Annual Computing and Communication Workshop and Conference. 2017.
Abstract: Traffic accidents occur every day, causing disruptions. The longer disruptions are in place, the more severe they may become as additional vehicles continue to enter the affected roadways. This paper looks at using passive data from a readily available source, smart phones, to detect traffic accidents automatically via machine learning algorithms and thereby allow additional alerts and actions to occur to minimize the disruption. Using simulated data, machine learning algorithms were scored for accuracy and the results were analyzed.
10. . Using Simulation and Mobile Technology to Improve Day-of Surgery Patient Care. In Proceedings of Healthcare Systems Process Improvement Conference. 2017.
11. . Assessing the Credibility of Vehicle Data Reported by Anonymous Sources. In Proceedings of the 8th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference . 2017.
Abstract: Intelligent Transportation Systems (ITS) perform analyses and make recommendations related to traffic based on data received. In general, the more data available, the more accurate and or timely the results. There exists a plethora of untapped data sources in the form of smart devices, such as smartphones, and vehicles with driver-assist technology. Accepting data haphazardly, however from any available source may put the ITS system integrity at risk resulting in potential increases false positives or negatives or delayed detection of true positive traffic events. This paper looks at using Support Vector Machine (SVM) algorithms to classify reported vehicle behavior as good or bad so a decision as to whether or not to consider reports from those sources can be made. Using simulated data, three algorithms were applied and the results analyzed.
12. . Effectiveness of a Countdown Timer in Reducing OR Turnover Time. Journal of Mobile Technology in Medicine. 6 (3) 2017.
10.7309/jmtm.6.3.10
13. . Assessment of the Nurse Medication Administration Workflow Process. Journal of Healthcare Engineering. 2016 pp. 14. 2016.
http://dx.doi.org/10.1155/2016/6823185
Abstract: This paper presents findings of an observational study of the Registered Nurse (RN) Medication Administration Process (MAP) conducted on two comparable medical units in a large urban tertiary care medical center in Columbia, South Carolina. A total of 305 individual MAP observations were recorded over a 6-week period with an average of 5 MAP observations per RN participant for both clinical units. A key MAP variation was identified in terms of unbundled versus bundled MAP performance. In the unbundled workflow, an RN engages in the MAP by performing only MAP tasks during a care episode. In the bundled workflow, an RN completes medication administration along with other patient care responsibilities during the care episode. Using a discrete-event simulation model, this paper addresses the difference between unbundled and bundled workflow and their effects on simulated redesign interventions.
14. . DisCSP-Netlogo- an open-source framework in NetLogo for implementation and evaluation of the distributed constraints. In Proceedings of the Evaluating General-Purpose AI Workshop. 2016.
Abstract: Distributed Constraint programming (DisCSP/DCOP) is a programming approach used to describe and solve large classes of problems such as searching, combinatorial and planning problems. A simulation framework in NetLogo for distributed constraints search and optimization algorithms is presented. The purpose of this paper is to present an open-source solution for the implementation and evaluation of the distributed constraints in NetLogo. This tool can run with or without a graphical user interface in a cluster of computers with a large number of agents. It includes all needed techniques for implementing all existing DCSP and DCOP algorithms. A comparison with the main evaluation and testing platforms for distributed constraints search and optimization algorithms is presented.
15. . The Edit Distance Approach: An Alternate Method for Assessing Multi-Observer Agreement in Process Studies. Health Systems. 2015.
10.1080/10.1057/hs.2014.32
Abstract: Direct observation of complex health-care processes typically involves multi-observer recording of sequential process tasks. Inference, the key validity threat to multi-observer recording, is controlled with observer training and assessment for the degree of recording consistency across observers. The gold standard for assessing recording consistency is the Kappa statistic, which assumes an exact task sequence match among observers. This assumption, however, is often difficult to meet with health-care process observations where task speed and complexity can result in uneven task sequence recording among observers. The edit distance approach, derived from information string theory, is not predicated on an exact task sequence match and offers an alternative to the Kappa statistic for assessing multi-observer agreement. The paper uses simultaneously recorded process observations with uneven task sequences made by three observers to compare agreement results for the edit distance approach and Kappa statistic. Edit distance approach strengths and limitations are discussed.
16. . Evaluation of Google’s Voice Recognition and Sentence Classification for Health Care Applications. Engineering Management Journal. 27 (3) 2015.
10.1080/10429247.2015.1054752
Abstract: This study examined the use of voice recognition technology in perioperative services (Periop) to enable Periop staff to record workflow milestones using mobile technology. The use of mobile technology to improve patient flow and quality of care could be facilitated if such voice recognition technology could be made robust. The goal of this experiment was to allow the Periop staff to provide care without being interrupted with data entry and querying tasks. However, the results are generalizable to other situations where an engineering manager attempts to improve communication performance using mobile technology. This study enhanced Google's voice recognition capability by using post-processing classifiers (i.e., bag-of-sentences, support vector machine, and maximum entropy). The experiments investigated three factors (original phrasing, reduced phrasing, and personalized phrasing) at three levels (zero training repetition, 5 training repetitions, and 10 training repetitions). Results indicated that personal phrasing yielded the highest correctness and that training the device to recognize an individual's voice improved correctness as well. Although simplistic, the bag-of-sentences classifier significantly improved voice recognition correctness. The classification efficiency of the maximum entropy and support vector machine algorithms was found to be nearly identical. These results suggest that engineering managers could significantly enhance Google's voice recognition technology by using post-processing techniques, which would facilitate its use in health care and other applications.
17. . Adaptation and Believable Human Agents. In SwarmFest Conference Proceedings. 2015.
18. . Collision avoidance during group evasive manoeuvres: a comparison of real versus simulated swarms with manipulated vision and surface wave detectors. Proceedings of the Royal Society Biological Sciences. 281 2014.
10.1098/rspb.2014.0812
Abstract: Coordinated group motion has been studied extensively both in real systems (flocks, swarms and schools) and in simulations (self-propelled particle (SPP) models using attraction and repulsion rules). Rarely are attraction and repulsion rules manipulated, and the resulting emergent behaviours of real and simulation systems are compared. We compare swarms of sensory- eprived whirligig beetles with matching simulation models. Whirligigs live at the water's surface and coordinate their grouping using their eyes and antennae. We filmed groups of beetles in which antennae or eyes had been unilaterally obstructed and measured individual and group behaviours. We then developed and compared eight SPP simulation models. Eye-less beetles formed larger diameter resting groups than antenna-less or control groups. Antenna-less groups collided more often with each other during evasive group movements than did eye-less or control groups. Simulations of antenna-less individuals produced no difference from a control (or a slight decrease) in group diameter. Simulations of eye-less individuals produced an increase in group diameter. Our study is important in (i) differentiating between group attraction and repulsion rules, (ii) directly comparing emergent properties of real and simulated groups, and (iii) exploring a new sensory modality (surface wave detection) to coordinate group movement.
19. . Automatic Generation of Agent Behavior Models from Raw Observational Data. In Proceedings of the 15th International Workshop on Multi-Agent-Based Simulation. 2014.
Abstract: Agent-based modeling is used to simulate human behaviors in different fields. The process of building believable models of human behavior requires that domain experts and Artificial Intelligence experts work closely together to build custom models for each domain, which requires significant effort. The aim of this study is to automate at least some parts of this process. We present an algorithm called magic, which produces an agent behavioral model from raw observational data. It calculates transition probabilities between actions and identifies decision points at which the agent requires additional information in order to choose the appropriate action. Our experiments using synthetically-generated data and real-world data from a hospital setting show that the magic algorithm can automatically produce an agent decision process. The agent's underlying behavior can then be modified by domain experts, thus reducing the complexity of producing believable agent behavior from field data.
20. . Application of Computer Simulation Modeling to Medication Administration Process Redesign. In Advances in Engineering for Healthcare Safety. pp. 129--142. ed. . Multi-Science Publishing Co. Ltd.. 2013.
21. . Modeling yard crane operators as reinforcement learning agents. Research in Transportation Economics. 42 (1) pp. 3--12. 2013.
10.1016/j.retrec.2012.11.001
Abstract: Due to the importance of drayage operations, operators at marine container terminals are increasingly looking to reduce the time a truck spends at the terminal to complete a transaction. This study introduces an agent-based approach to model yard cranes for the analysis of truck turn time. The objective of the model is to solve the yard crane scheduling problem (i.e. determining the sequence of drayage trucks to serve to minimize their waiting time). It is accomplished by modeling the yard crane operators as agents that employ reinforcement learning; specifically, q-learning. The proposed agent-based, q-learning model is developed using Netlogo. Experimental results show that the q-learning model is very effective in assisting the yard crane operator to select the next best move. Thus, the proposed q-learning model could potentially be integrated into existing yard management systems to automate the truck selection process and thereby improve yard operations.
22. . Sum of heterogeneous blind zones predict movements of simulated groups. Ecological Modelling. 258 pp. 9--15. 2013.
10.1016/j.ecolmodel.2013.02.020
Abstract: Simulation models regarding groups of fish and birds based on individual movement decision rules have become increasingly sophisticated. Recent studies have started to tie together how the rules of homogeneous independent-acting individuals lead to emergent group behaviors. However, there is less research on the role that heterogeneity within a group has on these emergent properties. Heterogeneity in real animal groups due to hunger, sex, body size, species, and age can influence speed, nearest neighbor distance, and viewing angle. In our study we examine how differences in viewing angle (or its complement: blind zone) within a group influence emergent properties such as group size, polarization, group shape, and segregation. Simulated groups were assembled with different mixes of blind zones (e.g. half the members with a blind zone of 60 degrees and half with a blind zone of 120 degrees). Significant differences in many of the measured emergent properties were found and were related to the level of heterogeneity as well as the absolute value of the blind zone. In homogeneous groups, increased values for the blind zone led to groups that were: smaller, more elongated, and denser. In heterogeneous groups the sum of blind zones predicted emergent group behaviors. Specifically, as the sum of the blind zones increased: group size and density decreased and the shape of the group became rounder. However, several mixes produced emergent properties that were very different than the predicted regressions. Our findings suggest that it will be important for researchers to look at how individual differences in blind zones within real groups such as fish schools and bird flocks influence emergent behaviors. Our findings also have applications to designing sensor systems for car navigation systems and robotic arrays.
23. . Clustered Computing with NetLogo for the evaluation of asynchronous search techniques. In 12th IEEE International Conference on Intelligent Software Methodologies, Tools and Techniques. 2013.
Abstract: Distributed Constraint programming (DisCSP/DisCOP) is a programming approach used to describe and solve large classes of problems such as searching, combinatorial and planning problems. This type of distributed modelling appeared naturally for many problems for which the information was distributed to many agents. Modelling and simulation are essential tools in many areas of science and engineering, including computer science. The purpose of this article is to present an open-source solution for implementation and evaluation of the distributed constraints in NetLogo, model that can be run on a cluster of computers. Such a tool allows using various search techniques also the evaluation and analysis of performances of the asynchronous searching techniques. Also, in this paper we have developed a methodology to run the NetLogo models in a cluster computing environment or on a single machine, varying both parameter values and/or the random number of agents.
24. . Requirements for the Use of Mobile Computing Devices Within Perioperative Services. In Decision Sciences Institute Annual Meeting. 2013.
Abstract: This NSF-funded study examines how the use of mobile technology affects patient flow and quality of care in perioperative services. The researchers interviewed hospital managers and staff to determine their expectations about incorporating technology into their workflow. Both support development of reliable voice recognition capability to enable hands-free patient care.
25. . Effective Healthcare Process Redesign Through and Interdisciplinary Team Approach. In Studies in Healthcare Technology and Informatics. 192 MEDINFO 2013. 2013.
10.3233/978-1-61499-289-9-1138
26. . A novel methodology for modelling yard cranes at seaport terminals to support planning and real-time decision making. Int. J. Six Sigma and Competitive Advantage. 7 (1) 2012.
Abstract: This paper addresses the need by terminal operators to optimise the yard crane operations at seaport terminals. It introduces a novel agent-based approach to model yard cranes, where each crane acts as an autonomous agent that seeks to maximise its utility. A key component of the proposed agent-based simulation model is a set of utility functions that properly capture the essential decision making attributes of crane operators in choosing the next truck to serve. Simulation results reveal important insights about distance-based service strategy and time-based service strategy and how they can be used together to accomplish the terminal’s operational objectives. The developed simulation tool can be used by terminal management to make strategic planning and/or real-time operational decisions to improve and optimise yard crane operations.
27. . An Analysis of Constructive Network Formation Models (Extended Abstract). In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems. ed. . 2012.
28. . Modeling Yard Crane Operators as Reinforcement Learning Agents. Research in Transportation Economics. 2012.
29. . Application of Computer Simulation Modeling to Medication Administration Process Redesign. Journal of Healthcare Engineering. 3 (4) pp. 649--662. 2012.
Abstract: The medication administration process (MAP) is one of the most high-risk processes in health care. MAP workflow redesign can precipitate both unanticipated and unintended consequences that can lead to new medication safety risks and workflow inefficiencies. Thus, it is necessary to have a tool to evaluate the impact of redesign approaches in advance of their clinical implementation. This paper discusses the development of an agent-based MAP computer simulation model that can be used to assess the impact of MAP workflow redesign on MAP performance. The agent-based approach is adopted in order to capture Registered Nurse medication administration performance. The process of designing, developing, validating, and testing such a model is explained. Work is underway to collect MAP data in a hospital setting to provide more complex MAP observations to extend development of the model to better represent the complexity of MAP.
30. . An Agent-Based Solution Framework for Inter-Block Yard Crane Scheduling Problems. International Journal of Transportation Science and Technology. 1 (1) 2012.
Abstract: The efficiency of yard operations is critical to the overall productivity of a container terminal because the yard serves as the interface between the landside and waterside operations. Most container terminals use yard cranes to transfer containers between the yard and trucks (both external and internal). To facilitate vessel operations, an efficient work schedule for the yard cranes is necessary given varying work volumes among yard blocks with different planning periods. This paper investigated an agent-based approach to assign and relocate yard cranes among yard blocks based on the forecasted work volumes. The goal of our study is to reduce the work volume that remains incomplete at the end of a planning period. We offered several preference functions for yard cranes and blocks which are modeled as agents. These preference functions are designed to find effective schedules for yard cranes. In addition, we examined various rules for the initial assignment of yard cranes to blocks. Our analysis demonstrated that our model can effectively and efficiently reduce the percentage of incomplete work volume for any real-world sized problem
31. . Supply Network Topology and Robustness against Disruptions: An investigation using Multi-agent Model. International Journal of Production Research. 49 (5) pp. 1391--1404. 2011.
10.1080/00207543.2010.518744
Abstract: In this study we examine the relationship between supply network’s topology and its robustness in the presence of random failures and targeted attacks. The agent based model developed in this paper uses the basic framework and parameters in the experimental game presented in Sterman (1989) for modeling adaptive managerial decision making in an inventory management context. The study extends the linear supply chain context to a complex supply network and undertakes a rigorous examination of robustness of these supply networks that are characterized by distinct network characteristics. We theorize that network characteristics such as average path length, clustering coefficient, size of the largest connected component in the network and the maximum distance between nodes in the largest connected component are related to the robustness of supply networks, and test the research hypotheses using data from several simulation runs. Simulations were carried out using twenty distinct network topologies where ten of these topologies were generated using preferential attachment approach (based on the theory of scalefree networks) and the remaining ten topologies were generated using random attachment approach (using random graph theory as a foundation). These twenty supply networks were subjected to random demand and their performances were evaluated by considering varying probabilities of random failures of nodes and targeted attacks on nodes. We also consider the severity of these disruptions by considering the downtime of the affected nodes. Using the data collected from a series of simulation experiments, we test the research hypotheses by means of binomial logistic regression analysis. The results point towards a significant association between network characteristics and supply network robustness assessed using multiple performance measures. We discuss the implications of the study and present directions for future research.
32. . On bidding algorithms for a distributed combinatorial auction. Multiagent and Grid Systems. 7 (2-3) pp. 73-94. 2011.
10.3233/MGS-2011-0170
Abstract: Combinatorial auctions (CAs) are a great way to solve complex resource allocation and coordination problems. However, CAs require a central auctioneer who receives the bids and solves the winner determination problem, an NP-hard problem. Unfortunately, a centralized auction is not a good fit for real world situations where the participants have proprietary interests that they wish to remain private or when it is difficult to establish a trusted auctioneer. The work presented here is motivated by the vision of distributed CAs; incentive compatible peer-to-peer mechanisms to solve the allocation problem, where bidders carry out the needed computation. For such a system to exist, both a protocol that distributes the computational task amongst the bidders and strategies for bidding behavior are needed. PAUSE is combinatorial auction mechanism that naturally distributes the computational load amongst the bidders, establishing the protocol or rules the participants must follow. However, it does not provide bidders with bidding strategies. This article revisits and reevaluates a set of bidding algorithms that represent different bidding strategies that bidders can use to engage in a PAUSE auction, presenting a study that analyzes them with respect to the number of goods, bids, and bidders. Results show that PAUSE, along with the aforementioned heuristic bidding algorithms, is a viable method for solving combinatorial allocation problems without a centralized auctioneer.
33. . Application of El Farol model for managing marine terminal gate congestion. Research in Transportation Economics. 2011.
10.1016/j.retrec.2011.06.004
Abstract: Truck queuing at marine terminal gates has long been recognized as a source of emissions problem due to the large number of trucks idling. For this reason, there is a great deal of interest among the different stakeholders to lessen the severity of the problem. An approach being experimented by some terminals to reduce truck queuing at the terminal is to provide live views of their gates via webcams. An assumption made by the terminals in this method is that truck dispatchers and drivers will make rational decisions regarding their departure times such that there will be less fluctuations in truck arrivals at the terminal based on the live information. However, it is clear that if dispatchers send trucks to the terminal whenever the truck queues are short and not send trucks when the truck queues are long, it could lead to a perpetual whip lash effect. This study explores the predictive strategies that need to be made by the various dispatchers to achieve the desired effects (i.e. steady arrival of trucks and hence less queuing at the seaport terminal gates). This problem is studied with the use of an agent-based simulation model and the solution to the well known El Farol Bar problem. Results demonstrate that truck depots can manage (without any collaboration with one another) to minimize congestion at seaport terminal gates by using the provided real-time gate congestion information and some simple logics for estimating the expected truck wait time.
34. . An Agent-Based Approach to Modeling Yard Cranes at Seaport Container Terminals. In Proceedings of the Symposium on Theory of Modeling and Simulation. 2010.
Abstract: Due to environmental concerns, terminal operators at seaport container terminals are increasingly looking to reduce the time a truck spends at the terminal to complete a transaction. For terminals that stack their containers, the solution may seem obvious: add more yard cranes to reduce trucks’ wait time in the yard. However, the high cost of these cranes often prohibits terminal operators from freely buying more. Another reason is because there is no clear understanding of how the yard cranes’ availability and service strategy affect truck turn time. This study introduces an agent-based approach to model yard cranes for the analysis of truck turn time with respect to service strategy. It is accomplished by modeling the cranes as utility-maximizing agents. This study has identified a set of utility functions that properly capture the essential decision making process of crane operators in choosing the next truck to provide service to. The agent-based model is implemented using NetLogo, a cross-platform multi-agent programmable modeling environment. Simulation results show that the distance-based service strategy produces the best results in terms of average waiting time and the maximum waiting time of any truck.
35. . Building Agent-Based Models of Seaport Container Terminals. In Proceedings of 6th Workshop on Agents in Traffic and Transportation. 2010.
Abstract: Agent-based models are increasingly being used to simulate and analyze various transportation problems, from traffic flow to air traffic control. One transportation industry that has not received as much attention from the multi-agent systems community is seaport container terminals. It can be argued that the operations that take place at a container terminal are as complex as that of an airport. A seaport container terminal faces a myriad of operational challenges such as optimizing berth space, minimizing ship turnaround time, maximizing use of resources, and reducing wait time of drayage trucks. Due to environmental concerns, terminal operators and port planners are focusing on the problem of reducing the in-terminal wait time of drayage trucks. In this paper, we present our multiagent model of a container yard operation, its implementation using NetLogo, and some initial test results. We model yard cranes as opportunistic utility-maximizing agents using several different utility functions for comparison purposes. By using a representative layout of a terminal our simulation model allows us to analyze the behavior of the cranes and evaluate the collective performance of the system. We demonstrate that it is possible to build a realistic and useful model of yard crane operation. Our test results show that utility functions that give higher precedence to nearby trucks lead to much better results than those that favor serving trucks on a mostly first-come first-serve order.
36. . A Practical Multiagent Model for Resilience in Commercial Supply Networks. In Proceedings of the Twelfth International Workshop on Agent-Mediated Electronic Commerce. 2010.
Abstract: As commercial supply chains grow into complex global supply networks, more and greater risks are introduced for cooperating and competing companies alike. These networks can be affected by events such as natural disasters, terrorism, and of late, economic downturn. Supply industry leaders, such as IBM, have announced a need for methods to identify and prevent risks in these ever-growing complex networks. Multiagent-based simulation lends itself perfectly to supply network modeling due to its autonomous nature. Our research illustrates a multiagent supply network formation technique using greedy supply agents and limited resource allocation. Using these formations, the resilience of each network is compared with others and assessed so that we may ascertain the characteristics of risky supply network structure. Our results show that an increase in relationship resources results in a more resilient network; however, as the amount of available resources increases, the risk of the most vulnerable agent in the network decreases by a smaller margin.
37. . The Message Management Asynchronous Backtracking Algorithm. Journal of Experimental and Theoretical Artificial Intelligence. 20 (2) pp. 95--110. 2008.
10.1080/09528130701478629
Abstract: This paper shows how the Asynchronous Backtracking algorithm, a well known distributed constraint satisfaction algorithm, produces unnecessary messages and introduces our optimized algorithm, Message Management Asynchronous Backtracking, which reduces the number of messages the agents send. The message management mechanism removes the redundant messages, keeps message queue updated, and handles messages by package instead of individually in order to improve efficiency. Our test results show the algorithm significantly reduces the total number of messages sent and drastically reduces the number of cycles used when solving instances of the graph coloring problem.
38. . Approximate Bidding Algorithms for a Distributed Combinatorial Auction (Short Paper). In Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems. ed. . 2008.
Abstract: Distributed allocation and multiagent coordination problems can be solved through combinatorial auctions (CAs). However, most of the existing winner determination algorithms (WDAs) for CAs are centralized. The PAUSE auction is one of a few efforts to release the auctioneer from having to do all the work. The pausebid bidding algorithm generates myopically-optimal bids for agents in a PAUSE auction but its running time is exponential on the number of bids. We present new approximate bidding algorithms that not only run in linear time but also increase the utility of the bidders as result of small decrement in revenue.
39. . Experimental Analysis of the Effects of Agent Synchronization in Asynchronous Search Algorithms. International Journal of Software Engineering and Knowledge Engineering. 18 (5) pp. 619--636. 2008.
10.1142/S0218194008003799
Abstract: The asynchronous searching techniques are characterized by the fact that each agent instantiates its variables in a concurrent way. Then, it sends the values of its variables to other agents directly connected to it by using messages. These asynchronous techniques have different behaviors in the case of delays in sending messages. This article presents the opportunity for synchronizing the execution of agents in the case of asynchronous techniques. It investigates and compares the behaviors of several asynchronous techniques in two cases: agents process the received messages asynchronously (the real situation) and the synchronous case, when a synchronization of the execution of agents is done, i.e. the agents perform a computing cycle in which they process a message from a message queue. After that, the synchronization is done by waiting for the other agents to finalize the processing of their messages. The experiments show that the synchronization of the agents execution leads to lower costs in searching for solutions. A solution for synchronizing the agents execution is suggested for the analyzed asynchronous techniques.
40. . Ontology Matching Using an Artificial Neural Network to Learn Weights. In IJCAI Workshop on Semantic Web for Collaborative Knowledge Acquisition. 2007.
41. . An Equal Excess Negotiation Algorithm for Coalition Formation. In Proceedings of the Autonomous Agents and Multi-Agent Systems Conference. 2007.
Abstract: Coalition formation is an important form of interaction in multiagent systems. It enables the agents to satisfy tasks that they would otherwise be unable to perform, or would perform with a lower efficiency. The focus of our work is on real-world application domains where we have systems inhabited by rational, self-interested agents. We also assume an environment without any trusted central manager to resolve issues concerning multiple agents. For such environments, we have to determine both an optimal (utility-maximizing) coalition configuration and a stable payoff configuration, concurrently and in a distributed fashion. Solving each of these problems is known to be computationally expensive, and having to consider them together exacerbates the problem further. In this paper, we present our Progressive, Anytime, Convergent, and Time-efficient (PACT) algorithm for coalition formation to address the above concerns. We assess the stability of the resulting coalition by using a new stability concept, the relaxed core, which is a slight variation on the core. We show experimentally that our algorithm performs admirably in comparison to an optimal solution, it typically produces solutions that are relaxed-core-stable, and it scales well.
42. . EBDI: An Architecture for Emotional Agents. In Proceedings of the Autonomous Agents and Multi-Agent Systems Conference. 2007.
Abstract: Most of the research on multiagent systems has focused on the development of rational utility-maximizing agents. However, research shows that emotions have a strong effect on peoples' physical states, motivations, beliefs, and desires. By introducing primary and secondary emotion into BDI architecture, we present a generic architecture for an emotional agent, EBDI, which can merge various emotion theories with an agent's reasoning process. It implements practical reasoning techniques separately from the specific emotion mechanism. The separation allows us to plug in emotional models as needed or upgrade the agent's reasoning engine independently.
43. . Bidding Algorithms for a Distributed Combinatorial Auction. In Proceedings of the Autonomous Agents and Multi-Agent Systems Conference. 2007.
Abstract: Distributed allocation and multiagent coordination problems can be solved through combinatorial auctions. However, most of the existing winner determination algorithms for combinatorial auctions are centralized. The PAUSE auction is one of a few efforts to release the auctioneer from having to do all the work (it might even be possible to get rid of the auctioneer). It is an increasing price combinatorial auction that naturally distributes the problem of winner determination amongst the bidders in such a way that they have an incentive to perform the calculation. It can be used when we wish to distribute the computational load among the bidders or when the bidders do not wish to reveal their true valuations unless necessary. PAUSE establishes the rules the bidders must obey. However, it does not tell us how the bidders should calculate their bids. We have developed a couple of bidding algorithms for the bidders in a PAUSE auction. Our algorithms always return the set of bids that maximizes the bidder's utility. Since the problem is NP-Hard, run time remains exponential on the number of items, but it is remarkably better than an exhaustive search. In this paper we present our bidding algorithms, discuss their virtues and drawbacks, and compare the solutions obtained by them to the revenue-maximizing solution found by a centralized winner determination algorithm.
44. . The Effects of Agent Synchronization in Asynchronous Search Algorithms. In First KES Symposium on Agents and Multi-Agent Systems. 2007.
Abstract: The asynchronous searching techniques are characterized by the fact that each agent instantiates its variables in a concurrent way. Then, it sends the values of its variables to other agents directly con- nected to it by using messages. These asynchronous techniques have di®erent behaviors in case of delays in sending messages. This article depicts the opportunity for synchronizing agents' execution in case of asynchronous techniques. It investigates and compares the behaviors of several asynchronous techniques in two cases: agents process the received messages asynchronously (the real situation from practice) and the syn- chronous case, when a synchronization of the agents' execution is done i.e. the agents perform a computing cycle in which they process a mes- sage from a message queue. After that, the synchronization is done by waiting for the other agents to ¯nalize the processing of their messages. The experiments show that the synchronization of the agents' execution leads to lower costs in searching for solution. A solution for synchro- nizing the agents' execution is proposed for the analyzed asynchronous techniques.
45. . Examining the Relationship between Topology and Performance of Supply Networks in the Presence of Random and Targeted Disruptions. In 38th Annual Meeting Decision Sciences Institute. 2007.
Abstract: In this study we examine the relationship between supply network’s topology and its robustness, responsiveness and dynamism in the presence of random and targeted attacks. The investigation uses the theoretical and modeling framework proposed in Sterman (1988) as the basis for examining adaptive behavior in an inventory management decision context. The linear supply chain in Sterman (1988) is extended to form supply networks that have distinct topological characteristics. Specifically, the two dominant topological paradigms of random networks and scale-free networks are considered to form supply networks. The robustness, responsiveness and dynamism of these networks are examined by considering random node failures and targeted attacks on nodes. The study considers supply chain performance measures, such as inventory levels and cost, as well as network performance measures, such as characteristic path length, size and length of largest connected component, maximum distance in the largest connected component and clustering coefficients. Based on the findings of these computational experiments we develop several research propositions that would potentially enable further theory development of complex adaptive supply networks.
46. . A Distributed Algorithm for Finding Nucleolus-Stable Payoff Divisions. In Proceedings of the IEEE / WIC / ACM International Conference on Intelligent Agent Technology. 2007.
Abstract: The agents in multiagent systems can coordinate their actions and handle tasks jointly by forming coalitions. One of the important steps in this process is the fair division of payoff generated from such a joint effort among all coalition members. The nucleolus is widely recognized as a fair way of distributing the revenue in a coalition. While we have efficient algorithms for computing the nucleolus using linear programming based techniques, we believe that such approaches are infeasible in multiagent settings where the loci of decision making is distributed among all agents in the system, and there is no central agent that can aggregate all data and compute for all agents. Towards this end, in this paper we present a distributed algorithm that computes the nucleolus-stable payoff division for any multiagent system modeled as a characteristic form game. We empirically show that our algorithm has many desirable properties -- it searches only a small fraction of the solution space, evenly distributes the computational load among all agents, and executes reasonably quickly for this hard problem.
47. . Algorithms for Distributed Winner Determination In Combinatorial Auctions. In Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms. pp. 43--56. Springer. 2006.
10.1007/11888727_4
Abstract: The problem of optimal winner determination in combinatorial auctions consists of finding the set of bids that maximize the revenue for the sellers. Various solutions exist for solving this problem but they are all centralized. That is, they assume that all bids are sent to a centralized auctioneer who then determines the winning set of bids. In this paper we introduce the problem of distributed winner determination in combinatorial auctions which eliminates the centralized auctioneer. We present a set of distributed search-based algorithms for solving this problem and study their relative tradeoffs.
48. . Incorporating Emotions into Automated Negotiation. In Proceedings of the Agent Construction and Emotions Workshop. 2006.
Abstract: We introduce an emotional agent model that shows how emotions affect an agent's negotiation strategy. By adding emotions, we add the effects of these indirectly related features to the negotiation, features that are ignored in most models. Our new method, the PAD Emotional Negotiation Model, maps a nonemotional agent's strategy during negotiation to the strategy used by an emotional agent. Our evaluations show this model can be used to implement agents with various emotional states that mimic human emotions during negotiation.
49. . Multiagent Coordination Using a Distributed Combinatorial Auction. In AAAI Workshop on Auction Mechanism for Robot Coordination. 2006.
Abstract: Combinatorial auctions are a great way to represent and solve distributed allocation problems. Unfortunately, most of the winner determination solutions that exists are centralized. They require all agents to send their bids to a centralized auctioneer who then determines the winners. The PAUSE auction, in contrast, is an increasing-price combinatorial auction in which the problem of winner determination is naturally distributed amongst the bidders. Furthermore, the bidders' have an incentive to perform the required computations. But, until now, no bidding algorithm for the auction existed. We provide a bidding algorithm for agents in a PAUSE auction, the pausebid algorithm. It always returns the bid that maximizes the bidder's utility. In effect, pausebid is a the distributed counterpart to the existing centralized winner determination algorithms, from which we borrow several proven techniques. Our test results show that a system where all agents use pausebid finds the revenue-maximizing solution at least 95\% of the time. Run time, as expected since this is an NP-complete problem, remains exponential on the number of items.
50. . From Rational to Emotional Agents. In Proceedings of the AAAI Workshop on Cognitive Modeling and Agent-based Social Simulation. 2006.
Abstract: This paper presents the Emotional-Belief-Desire-Intention architecture which reflects humans' practical reasoning by adding the influence of primary and secondary emotions into the decision making process of a traditional BDI architecture. Our architecture handles bounded resources by using primary emotions as the first filter for adjusting the priority of beliefs, thereby allowing the agents to speed up decision making. Secondary emotions are used to refine the decision when time permits. We present a sample EBDI agent for the Tileworld domain in order to show our architecture might be used.
51. . Fundamentals of Multiagent Systems: Using NetLogo Models. Unpublished. 2006. http://www.multiagent.com
Abstract: A multiagent systems textbook which emphasizes the game theoretical foundations of multiagent research and combines them with hands-on experimentation of system dynamics using NetLogo sample programs. This textbook is a work in progress.
52. . Cultural Tactical Advisor for Warfighters. In Proceedings of 25th Army Science Conference. 2006.
Abstract: We are developing a mobile handheld system that provides tactical and cultural advice to warfighters. The system fuses built-in knowledge of social factors and location specific information with dynamically entered situation descriptions to produce an assessment of the situation and recommend actions. The outcomes include the system’s confidence in its recommendations, along with explanations of its reasoning. The result gives warfighters the information they need to make the critical decisions necessary to accomplish their mission, while minimizing the collateral damage that alienates the local populace.
53. . Towards Adaptive Workflow Enactment Using Multiagent Systems. Information Technology and Management Journal. 6 (1) pp. 61--87. 2005.
10.1007/s10799-004-7775-2
Abstract: Advances in Information Technology have created opportunities for business enterprises to redesign their information and process management systems. The redesigned systems will likely employ some form of workflow management system. Workflow management systems exactly enact business processes described in a process description language. Unfortunately, such strict adherence to the prescribed workflow makes it impossible for the system to adapt to unforeseen circumstances. We firmly believe that the historic trajectory of software development paradigms and IT advancements will establish multiagent systems as the workflow enactment mechanism of the future. In this paper we provide a critical survey of workflow, workflow description languages, web services and agent technologies. We propose that workflow description languages and their associated design tools can be used to specify a multiagent system. Specifically, we advance the idea that the Business Process Execution Language for Web Services (BPEL4WS) can be used as a specification language for expressing the initial social order of the multiagent system, which can then intelligently adapt to changing environmental conditions.
54. . A Protocol for a Distributed Recommender System. In Trusting Agents for Trusting Electronic Societies. ed. . Springer. 2005.
Abstract: We present a domain model and protocol for the exchange of recommendations by selfish agents without the aid of any centralized control. Our model captures a subset of the realities of recommendation exchanges in the Internet. We provide an algorithm that selfish agents can use for deciding whether to exchange recommendations and with whom. We analyze this algorithm and show that, under certain common circumstances, the agents' rational choice is to exchange recommendations. Finally, we have implemented our model and algorithm and tested the performance of various populations. Our results show that both the social welfare and the individual utility of the agents is increased by participating in the exchange of recommendations.
55. . Reducing Redundant Messages in the Asynchronous Backtracking Algorithm. In Proceedings of the Sixth International Workshop on Distributed Constraint Reasoning. 2005.
Abstract: We show how the Asynchronous Backtracking Algorithm, a well known distributed constraint satisfaction algorithm, produces unnecessary messages. Our new optimized algorithm reduces the number of messages by implementing message management mechanism. Tests show our algorithm significantly reduces the total number of messages sent and drastically reduces the number of cycles used when solving instances of the graph coloring problem.
56. . Algorithms for Distributed Winner Determination In Combinatorial Auctions. In Agent-Mediated Electronic Commerce VII. 2005.
Abstract: The problem of optimal winner determination in combinatorial auctions consists of finding the set of bids that maximize the revenue for the sellers. Various solutions exist for solving this problem but they are all centralized. That is, they assume that all bids are sent to a centralized auctioneer who then determines the winning set of bids. In this paper we introduce the problem of distributed winner determination in combinatorial auctions which eliminates the centralized auctioneer. We present a set of distributed search-based algorithms for solving this problem and study their relative tradeoffs.
57. . Multiagent Workflow Enactment Using Adaptive Pricing Mechanisms. In AAAI Planning and Scheduling for Web Services Workshop. 2005.
Abstract: We study the problem of distributed workflow enactment in which new job requests, each composed of a workflow, a deadline, and a payment, arrive at a company at regular intervals. The company must decide which services to perform in which workflows and with which service agents. It must also provide the proper monetary incentives to its selfish service agents so as to align their interests with those of the company. In this scenario we evaluate various pricing strategies and show that an adaptive pricing mechanism is required because it is a dominant strategy and it increases revenue.
58. . Tools and Lessons from a Multiagent Systems' Class. Italics. 4 (3) 2005.
Abstract: We provide a summary of the lessons we have learned after teaching a graduate multiagent systems class over the last six years. The class has used various technologies such as RoboCup (along with our Biter and SoccerBeans tools), NetLogo, JADE, and FIPA-OS. We discuss their advantages and disadvantages. We also discuss our view of the future of multiagent systems. We notice the ongoing separation of software agent design from the theoretical underpinnings of multiagent theory and propose the development of a unifying notation for representing multiagent problems.
59. . The Effects of Cooperation on Multiagent Search in Task-Oriented Domains. Journal of Experimental and Theoretical Artificial Intelligence. 16 (1) pp. 5--18. 2004.
10.1080/09528130410001710792
Abstract: We study the benefits of teaming and selflessness when using multiagent search to solve task-oriented problems. We start by presenting a formal framework for multiagent search which, we show, forms a superset of the task-oriented domain, coalition formation, distributed constraint satisfaction, and $NK$ landscape search problems. We focus on task-oriented domain problems and show how the benefits of teaming and selflessness arise in this domain. These experimental results are compared to similar results in the $NK$ domain—from which we import a predictive technique. Namely, we show that better allocations are found when the dynamics of the multiagent system lie between order and chaos. Several other specific findings are presented such as the fact that neither absolute selfishness nor absolute selflessness result in better allocations, and the fact that the formation of small teams usually leads to better allocations.
60. . Building Blocks for Agent Design. In Agent-Oriented Software Engineering. pp. 153--166. ed. . Springer-Verlag. 2004.
10.1007/b95187
Abstract: We present our Component-Based Agent Framework, which enables a software engineer to design a set of agents by using a visual component-based toolkit (Sun's BDK), and wiring together desired blocks of functionality. We instantiate this framework in the RoboCup domain by implementing the necessary components. The implementation also serves as a proof of the viability of our framework. Finally, we use this implementation to build sample agents. The proposed framework is a first step towards the merging of agent-based and component-based design tools.
61. . Multiagent Systems with Workflows. IEEE Internet Computing. 8 (1) pp. 76--82. 2004.
10.1109/MIC.2004.1260707
Abstract: Industry and researchers have two different visions for the future of Web services. Industry wants to capitalize on Web service technology to automate business processes via centralized workflow enactment. Researchers are interested in the dynamic composition of Web services. The authors show how these two visions are two points in a continuum and discuss a possible path for bridging the gap between them.
62. . Multiagent Systems Past and Future. In AAMAS Workshop on Teaching Multiagent Systems. 2004.
Abstract: We describe the lessons learned from using various technologies as aids in teaching a graduate multiagent systems class. The class has been offered six times over the last five years. The technologies described are RoboCup (along with our Biter and SoccerBeans tools), NetLogo, JADE, and FIPA-OS. We also discuss our view of the future of multiagent systems which includes the separation of software agent design into a separate class that focuses on distributed programming and the development of a unifying notation for representing multiagent problems.
63. . Enacting BPEL4WS Specified Workflows with Multiagent Systems. In Proceedings of the Workshop on Web Services and Agent-Based Engineering. 2004.
Abstract: This paper describes our development of a distributed, functionally equivalent agent-based workflow enactment mechanism from a BPEL4WS specification. This work demonstrates that BPEL4WS can be viewed as a description of the social order of a collection of agents, where the agents serve as proactive proxies for the underlying passive Web services. Although the Semantic Web initiative is working toward semantically rich descriptions of Web services, which can be reasoned about by agents, the current state-of-the-art does not yet allow for collections of agents representing semantic Web services to organize themselves to enact workflows. Therefore, this work is critically important as it serves as a bridge from existing, static views of workflow enactment to future, agent-based, dynamic workflow engines.
64. . Preparing for Service-Oriented Computing: A Composite Design Pattern for Stubless Web Service Invocation. In International Conference on Web Engineering. 2004.
Abstract: The ability to dynamically bind to Web services at runtime is becoming increasingly important as the era of Service-Oriented Computing (SOC) emerges. With SOC selection and invocation of Web service partners will occur in software at run-time, rather than by software developers at design and compile time. Unfortunately, the marketplace has yet to yield a predominate applications programming interface for the invocation of Web services. This results in software that is deeply ingrained with vendor-specific calls. This is problematic because Web service technology is changing at a rapid pace. In order to leverage the latest developments, code often needs to be heavily refactored to account for changing invocation interfaces. This paper explores the mitigation of this problem through the application of software design patterns. Specifically, it details how a Web service architectural pattern, based upon the composition of software design patterns, provides for implementations that insulate the application code from the peculiarities of any specific vendor's interface.
65. . Integrating Agent Services into BPEL4WS Defined Workflows. In Proceedings of the Fourth International Workshop on Web-Oriented Software Technologies. 2004.
Abstract: In the future, Web services and software agents will coexist in the Business Process Management solution space. In our vision, agents will have symbiotic relationships with Web services, harnessing them as externally defined agent behaviors. In this paper we detail the development of a demonstration system that transparently integrates agent services into BPEL4WS defined workflows. The development of the demonstration system illustrates the power of compositional approaches to system creation. It also serves to reinforce the importance of open standards, since the integration of the separate components is dependent upon the interoperability that standards provide. This work is an important first step toward fully integrated agent-based workflow management systems.
66. . Predicting the expected behavior of agents that learn about agents: the CLRI framework. Autonomous Agents and Multi-Agent Systems. 6 (1) pp. 77-107. 2003.
10.1023/A:1021765422660
Abstract: We describe a framework and equations used to model and predict the behavior of multi-agent systems (MASs) with learning agents. A difference equation is used for calculating the progression of an agent's error in its decision function, thereby telling us how the agent is expected to fare in the MAS. The equation relies on parameters which capture the agent's learning abilities, such as its change rate, learning rate and retention rate, as well as relevant aspects of the MAS such as the impact that agents have on each other. We validate the framework with experimental results using reinforcement learning agents in a market system, as well as with other experimental results gathered from the AI literature. Finally, we use PAC-theory to show how to calculate bounds on the values of the learning parameters
67. . Learning in Multiagent Systems: An Introduction from a Game-Theoretic Perspective. In Adaptive Agents: LNAI 2636. pp. 202--215. ed. . Springer Verlag. 2003.
Abstract: We introduce the topic of learning in multiagent systems. We first provide a quick introduction to the field of game theory, focusing on the equilibrium concepts of iterated dominance, and Nash equilibrium. We show some of the most relevant findings in the theory of learning in games, including theorems on fictitious play, replicator dynamics, and evolutionary stable strategies. The CLRI theory and n-level learning agents are introduced as attempts to apply some of these findings to the problem of engineering multiagent systems with learning agents. Finally, we summarize some of the remaining challenges in the field of learning in multiagent systems.
68. . An Incentive-Compatible Distributed Recommendation Model. In Proceedings of the Sixth International Workshop on Trust, Privacy, Deception, and Fraud in Agent Societies. pp. 84--91. 2003.
Abstract: Our research is concerned with the study and development of incentive-compatible exchange mechanisms for recommendations in a multiagent system. These mechanism will allow and motivate agents to create an economy of ideas, where agents trade recommendations between themselves. In this paper we present a domain model and an incentive-compatible protocol for information exchange. Our model captures a subset of the realities of recommendation exchanges in the Internet. We provide an algorithm that selfish agents can use for deciding whether to exchange recommendations and with whom. We analyze this algorithm and show that, under certain common circumstances, the agents' rational choice is to exchange recommendations. Finally, we have implemented our model and algorithm and tested the performance of various populations. Our results show that both the social welfare and the individual utility of the agents is increased by participating in the exchange of recommendations.
69. . Matchmaking of Web Services Based on the DAML-S Service Model. In Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems. pp. 926--927. 2003.
Abstract: DAML-S provides the means for a web service to advertise its functionality to potential users of the service. This brings to fore the issue of discovering an advertisement that best matches a request for a particular service a process referred to as matchmaking. The algorithms that have thus far been proposed for matchmaking are based on comparisons of the requested and offered inputs and outputs. In this project, we extend these algorithms by taking into account the detailed process description of the service, thus leading to more accurate matchmaking. That is, we present an algorithm that will allow users to find services based on their Service Model Description. The query language we introduce supports both positive and negative terms. The algorithm runs in worst time of O($c^n$ ), where c is the number of process nodes in the advertisement and n is the number of outputs to be matched. We also show results of tests performed against a simple database.
70. . A Prototype MultiAgent Network Security System. In Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems. pp. 1094-1095. 2003.
Abstract: Distributed Internet-based attacks on computer systems are becoming more prevalent. These attacks usually employ some form of automation and involve the compromise of many systems across the Internet; systems which are not necessarily owned by the same company or individual. The information needed to detect and neutralize these attacks is spread across many machines. A system administrator who wishes to detect and handle these distributed attacks must constantly monitor his systems and communicate with other administrators around the world—a challenging task. In this paper we present our design and implementation of a multi-agent system, built using FIPA-OS, in which agents responsible for different network realms communicate with each other in order to determine if certain suspicious events are actually part of a distributed attack, and to warn each other about possible threats. We describe the event types which, we have found, flag the presence of suspicious activities and trigger the agents into action. We explain the various interaction protocols that we have implemented in order to handle these suspicious events. We discuss issues and requirements involved in standardizing formats and architectures for the distributed management of intrusion detection. Finally, we present the results of some of the tests we have performed on our system.
71. . Semantic Web Services as Agent Behaviors. In Agentcities: Challenges in Open Agent Environments. pp. 25--31. ed. . Springer-Verlag. 2003.
Abstract: We describe a technique for providing agent software with dynamically configured capabilities. These capabilities, described with DAML-S, can represent atomic or orchestrated Web Services. The DAML-S specification will be transformed into an executable program written in a composition language named Piccola. When executed, the composite service will be available as a semantically described behavior within a FIPA compliant agent.
72. . Adaptive Workflow = Web Services + Agents. In Proceedings of the International Conference on Web Services. pp. 131--137. CSREA Press. 2003.
Abstract: Workflow management systems exactly enact business processes described in a process description language. Unfortunately, such strict adherence to the prescribed workflow makes it impossible for the system to adapt to unforeseen circumstances. In this paper we propose that workflow description languages and their associated design tools can be used to specify a multiagent system. Specifically, we advance the idea that the Business Process Execution Language for Web Services can be used as a specification language for expressing the initial social order of a multiagent system, which can then intelligently adapt to changing environmental conditions.
73. . Building Blocks for Agent Design. In Proceedings of the Fourth International Workshop on Agent-Oriented Software Engineering. pp. 17--30. 2003.
74. . A Method for Solving Distributed Service Allocation Problems. Web Intelligence and Agent Systems: An International Journal. 1 (2) pp. 139--146. 2003.
Abstract: We present a method for solving service allocation problems in which a set of services must be allocated to a set of agents so as to maximize a global utility. The method is completely distributed so it can scale to any number of services without degradation. We first formalize the service allocation problem and then present a simple hill-climbing, a global hill-climbing, and a bidding-protocol algorithm for solving it. We analyze the expected performance of these algorithms as a function of various problem parameters such as the branching factor and the number of agents. Finally, we use the sensor allocation problem, an instance of a service allocation problem, to show the bidding protocol at work. The simulations also show that phase transition on the expected quality of the solution exists as the amount of communication between agents increases.
75. . Biter: A Platform for the Teaching and Research of Multiagent Systems' Design using RoboCup. In RoboCup 2001: Robot Soccer World Cup V. LNCS/LNAI Lecture Notes Volume 2377. pp. 299--304. ed. . Springer-Verlag. 2002.
76. . Using RoboCup to Teach Multiagent Systems and the Distributed Mindset. In Proceedings of the 33rd ACM Technical Symposium on Computer Science Education. pp. 3--7. 2002.
Abstract: We present our experiences using the RoboCup soccerserver simulator and Biter, our own agent platform, for the teaching of a graduate multiagent systems' class. The RoboCup simulator and Biter are both described. We argue that the combination of RoboCup and Biter forms an effective platform for the teaching of multiagent systems and the distributed mindset. Results from two semesters using these tools are presented. These results confirm our claims. Finally, we characterize this work within the framework provided by the STEELMAN Draft of the Computing Curricula 2001 initiative.
77. . The Effects of Cooperation on Multiagent Search in Task-Oriented Domains. In Proceedings of the Autonomous Agents and Multi-Agent Systems Conference. pp. 453-454. 2002.
78. . Multiagent Network Security System using FIPA-OS. In Proceedings of the IEEE SoutheastCon. 2002.
Abstract: This paper describes a security framework in distributed systems where an Intelligent Agent handles the security monitoring at each host. The agents are made responsible for alerting the system administrators about an attempted intrusion or misuse for a particular system. Recently, there has been an increase in the number of reports of the attacks, which are wide spread across the network and affecting a chain of systems before they attack the actual target system. To detect such attacks, the amount of information associated within a single isolated system is inadequate for an agent to confirm an intrusion. Therefore, the need for a framework that allows the agents to negotiate with their co-agents to share information about an intrusion, thereby aiding in effective handling of Intrusion Detection is emphasized. Our design aims at developing such a framework in the FIPA-OS (Foundation for Intelligent Physical Agents ? Open Source) environment, which provides most of the source code for building agents on its platform. The concept of mutual co-operation among agents has been developed as a means of queries. These queries are carried out by tasks associated with each agent. The protocols to support these interactions by means of queries are explained. The issues and requirements involved in standardizing formats, interaction protocols and architectures to co-manage intrusion detection are discussed.
79. . Toward the Synthesis of Web Services and Agent Behaviors. In Proceedings of the First International Workshop on Challenges in Open Agent Systems. pp. 25--29. 2002.
Abstract: Today s software systems are becoming more net-centric, distributed, and heterogeneous. Hardware, software and networking technology will combine in a milieu in which they become ubiquitous and inseparable. The acceleration of technology and time-to-market pressures make it increasingly difficult to produce software. In order to achieve the promise of the information age, software developers will require new abstractions that will allow them to manage the overwhelming complexity of this digital landscape. This short position paper describes a novel technique that will imbue agent software with dynamically configured capabilities. These capabilities, described with DAML-S, can represent atomic or orchestrated Web Services. The DAML-S specification will be transformed into an executable program written in a composition language named Piccola. When executed, the composite service will be available as a semantically described behavior within a FIPA compliant agent. The proposed architecture is designed for scalability, from mobile PDA devices with wireless connectivity to resource-rich server class systems.
80. . Multiagent Systems. In The Handbook of Brain Theory and Neural Networks. pp. 707--711. ed. . MIT Press. 2002.
81. . Book Review: Strategic negotiation in multiagent environments. ACM Computing Reviews. 2002.
82. . Book Review: Reasoning about rational agents. ACM Computing Reviews. 2002.
83. . Book Review: Autonomous agents and multi-agent systems: explorations in learning, self-organization and adaptive computation. ACM Computing Reviews. 2002.
84. . Teaching Multiagent Systems using RoboCup and Biter. The Interactive Multimedia Electronic Journal of Computer-Enhanced Learning. 4 (2) 2002.
85. . Location Dependent Service Delivery to Resource Limited Mobile Devices. In Proceedings of the Workshop on Ubiquitous Agents on embedded, wearable, and mobile devices . 2002.
86. . Inside an Agent. IEEE Internet Computing. 5 (1) pp. 82--86. 2001.
Abstract: Multiagent-system platforms aid in creating agent-based systems, but to use them effectively we must understand an agent's architecture.
87. . Book Review: Layered Learning in Multiagent Systems: A Winning Approach to Robotic Soccer. Autonomous Agents and Multi-Agent Systems. 4 (3) 2001.
88. . Biter: A Platform for the Teaching and Research of Multiagent Systems' Design using RoboCup. In Proceedings of the Robocup International Symposium. 2001.
Abstract: We introduce Biter, a platform for the teaching and research of multiagent systems' design. Biter implements a client for the RoboCup simulator. It provides users with the basic functionality needed to start designing sophisticated RoboCup teams. Some of its features include a world model with absolute coordinates, a graphical debugging tool, a set of utility functions, and a Generic Agent Architecture (GAA) with some basic behaviors such as dribble ball to goal'' and dash to ball''. The GAA incorporates an elegant object-oriented design meant to handle the type of activities typical for an agent in a multiagent system. These activities include reactive responses, long-term behaviors, and conversations with other agents. We also discuss our initial experiences using Biter as a pedagogical tool for teaching multiagent systems' design.
89. . A Generic Agent Architecture for Multiagent Systems. 2001. USC CSCE TR-2002-011
Abstract: We introduce the Generic Agent Architecture (GAA) along with Biter—an implementation of our GAA for the RoboCup domain. The GAA incorporates an elegant object-oriented design meant to handle the type of activities typical for an agent in a multiagent system. These activities include reactive responses, long-term behaviors, and conversations with other agents. We also show how small modifications in the GAA implementation can lead to a subsumption agent or to a BDI agent. Finally, we present our Biter implementation as a proof of concept and use it to illustrate the added functionality that a user of the GAA must implement in a specific domain in order to utilize our GAA.
90. . Book Review: Objective coordination in multi-agent system engineering: design and implementation. ACM Computing Reviews. 2001.
91. . Online Auctions. IEEE Internet Computing. 3 (3) pp. 103--105. 1999.
92. . Book Review: Gerhard Weiss, ed., Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence. Autonomous Agents and Multi-Agent Systems. 2 (4) pp. 403--408. 1999.
93. . The Dynamics of the UMDL Service Market Society. In Cooperative Information Agents II. pp. 55--78. ed. . Springer. 1998.
94. . The UMDL Service Market Society. In Proceedings of the Second International Conference on Autonomous Agents. 1998.
95. . A Framework for Learning Agents and its Application to Market-Based MASs. In Proceedings of the AAAI Symposium on Satisficing Models. ed. . 1998.
96. . The Moving Target Function Problem in Multi-Agent Learning. In Proceedings of the Third International Conference on Multi-Agent Systems. pp. 317--324. AAAI/MIT press. 1998.
Abstract: We describe a framework that can be used to model and predict the behavior of MASs with learning agents. It uses a difference equation for calculating the progression of an agent's error in its decision function, thereby telling us how the agent is expected to fare in the MAS. The equation relies on parameters which capture the agents' learning abilities (such as its change rate, learning rate and retention rate) as well as relevant aspects of the MAS (such as the impact that agents have on each other). We validate the framework with experimental results using reinforcement learning agents in a market system, as well as by other experimental results gathered from the AI literature.
97. . Learning Nested Models in an Information Economy. Journal of Experimental and Theoretical Artificial Intelligence. 10 (3) pp. 291--308. 1998.
Abstract: We present our approach to the problem of how an agent, within an economic Multi-Agent System, can determine when it should behave strategically (i.e. learn and use models of other agents), and when it should act as a simple price-taker. We provide a framework for the incremental implementation of modeling capabilities in agents, and a description of the forms of knowledge required. The agents were implemented and different populations simulated in order to learn more about their behavior and the merits of using and learning agent models. Our results show, among other lessons, how savvy buyers can avoid being cheated'' by sellers, how price volatility can be used to quantitatively predict the benefits of deeper models, and how specific types of agent populations influence system behavior.
98. . Computational Agents That Learn About Agents: Algorithms for Their Design and a Predictive Theory of Their Behavior. 1998.
Abstract: We show how to build agents that learn about agents in Multi-Agent Systems (MAS) composed of similar learning agents. The problem is divided into the two subproblems of deciding how much an agent should think about what others think about what others think\ldots and the problem raised by the fact that if the other agents are learning and changing their behavior, an agent's model of them might never be accurate. We start by presenting a framework that can formally describe a MAS and the agents that inhabit it, along with their behavior and a measure of the correctness of this behavior. The framework is used to develop an algorithm (LR-RMM) that tells an agent when to stop thinking about other agents. The algorithm is implemented and its results verified. The framework is then extended to capture the agents' learning abilities and the degree to which they impact each others' behavior. This extended framework (CLRI) is used to predict the expected behavior of learning agents in MASs. Theoretical predictions from this framework are confirmed with experimental results from our research and with experimental results from the research literature. Finally, a specific market-based MAS is studied in detail. We confirm results predicted by the CLRI framework and present other findings specific to market-based MAS. These findings include the fact that learning agents make the system more robust to the presence of malicious agents, and the fact that agents can expect decreasing returns for increasing levels of strategic thinking.
99. . Analyzing Agents that Learn about Agents. In Proceedings of the Fourteenth National Conference on Artificial Intelligence. pp. 849. The MIT Press. 1997.
100. . Agents Learning about Agents: A Framework and Analysis. In Multiagent Learning Workshop. 1997.
Abstract: We provide a framework for the study of learning in certain types of multi-agent systems (MAS), that divides an agent's knowledge about others into different types''. We use concepts from computational learning theory to calculate the relative sample complexities of learning the different types of knowledge, given either a supervised or a reinforcement learning algorithm. These results apply only for the learning of a fixed target function, which would probably not exist if the other agents are also learning. We then show how a changing target function affects the learning behaviors of the agents, and how to determine the advantages of having lower sample complexity. Our results can be used by a designer of a learning agent in a MAS to determine which knowledge he should put into the agent and which knowledge should be learned by the agent.
101. . Toward Inquiry-Based Education Through Interacting Software Agents. IEEE Computer. 29 (5) pp. 69--76. 1996.
102. . Agents Modeling Agents in Information Economies. In Proceedings of the Thirteenth National Conference on Artificial Intelligence. pp. 1415. The MIT Press. 1996.
103. . Using Recursive Agent Models Effectively. In Intelligent Agents Volume II. pp. 171--196. ed. . Sprin\-ger-Ver\-lag. 1996.
104. . The Impact of Nested Agent Models in an Information Economy. In Proceedings of the Second International Conference on Multi-Agent Systems. pp. 377--384. AAAI/MIT press. 1996.
Abstract: We present our approach to the problem of how an agent, within an economic Multi-Agent System, can determine when it should behave strategically (i.e. model the other agents), and when it should act as a simple price-taker. We provide a framework for the incremental implementation of modeling capabilities in agents. These agents were implemented and different populations simulated in order to learn more about their behavior and the merits of using agent models. Our results show, among other lessons, how savvy buyers can avoid being cheated'' by sellers, how price volatility can be used to quantitatively predict the benefits of deeper models, and how specific types of agent populations influence system behavior.
105. . Building agent models in economic societies of agents. In Working Notes of the AAAI-96 Workshop on Agent Modeling. pp. 90--97. ed. . 1996.
106. . Recursive Agent Modeling Using Limited Rationality. In Proceedings of the First International Conference on Multi-Agent Systems. pp. 125--132. AAAI/MIT press. 1995.
Abstract: We present an algorithm that an agent can use for determining which of its nested, recursive models of other agents are important to consider when choosing an action. Pruning away less important models allows an agent to take its best'' action in a timely manner, given its knowledge, computational capabilities, and time constraints. We describe a theoretical framework, based on \em situations, for talking about recursive agent models and the strategies and expected strategies associated with them. This framework allows us to rigorously define the \em gain of continuing deliberation versus taking action. The expected gain of computational actions is used to guide the pruning of the nested model structure. We have implemented our approach on a canonical multi-agent problem, the pursuit task, to illustrate how real-time, multi-agent decision-making can be based on a principled, combinatorial model. Test results show a marked decrease in deliberation time while maintaining a good performance level.
107. . Task Planning Agents in the UMDL. In Proceedings of the Fourth International Conference on Information and Knowledge Management (CIKM) Workshop on Intelligent Information Agents.. ed. . 1995.
108. . Automatic Verification of a Class of Symmetric Parallel Programs. In Proceedings of the IFIP 13th World Computer Congress. Volume 1 : Technology and Foundations. pp. 571--578. ed. . Elsevier Science Publishers. 1994.
109. . RMM's Solution Concept and the Equilibrium Point Solution. In Proceedings of the 13th International Distributed Artificial Intelligence Workshop. 1994.
Abstract: Research in distributed AI has dealt with the interactions of agents' both cooperative and self-interested. The Recursive Modeling Method (RMM) is one method used for modeling rational self-interested agents. It assumes that knowledge is nested to a finite depth. An expansion of RMM using a sigmoid function was proposed with the hope that the solution concept of the new RMM would approximate the Nash EP in cases where RMMS knowledge approximated the common knowledge that is assumed by game theory. In this paper, we present a mathematical analysis of RMM with the sigmoid function and prove that it indeed tries to converge to the Nash EP. However, we also show how and why it fails to do so for most cases. Using this analysis we argue for abandoning the sigmoid function as an implicit representation of uncertainty about the depth of knowledge in favor of an explicit representation of the uncertainty. We also suggest other avenues of research that might give us other more efficient solution concepts which would also take into consideration the cost of computation and the expected gains.
110. . Agent Modeling Methods Using Limited Rationality. In Proceedings of the Twelfth National Conference on Artificial Intelligence. pp. 1495. 1994.