Skip to main content
Log in

Dynamically generated commitment protocols in open systems

  • Published:
Autonomous Agents and Multi-Agent Systems Aims and scope Submit manuscript

Abstract

Agent interaction is a fundamental part of any multiagent system. Such interactions are usually regulated by protocols, which are typically defined at design-time. However, in many situations a protocol may not exist or the available protocols may not fit the needs of the agents. In order to deal with such situations agents should be able to generate protocols at runtime. In this paper we develop a three-phase framework to enable agents to create a commitment protocol dynamically. In the first phase one of the agents generates candidate commitment protocols, by considering its goals, its abilities and its knowledge about the other agents’ services. We propose two algorithms that ensure that each generated protocol allows the agent to reach its goals if the protocol is enacted. The second phase is ranking of the generated protocols in terms of their expected utility in order to select the one that best suits the agent. The third phase is the negotiation of the protocol between agents that will enact the protocol so that the agents can agree on a protocol that will be used for enactment. We demonstrate the applicability of our approach using a case study.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. Recall that a set containing an empty set, i.e. \(\{ \emptyset \}\), is distinct from the empty set \(\emptyset \), for instance \(\{a\} \cup \emptyset = \{a\}\) but \(\{a\} \cup \{ \emptyset \} = \{a, \emptyset \}\)

  2. The code is available from: http://mas.cmpe.boun.edu.tr/akin/protgen.html

References

  1. Alberti, M., Cattafi, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., et al. (2011). A computational logic application framework for service discovery and contracting. International Journal of Web Service Research, 8(3), 1–25.

    Article  Google Scholar 

  2. Artikis, A. (2009). Dynamic protocols for open agent systems. In Proceedings of the eighth international conference on autonomous agents and multiagent systems (AAMAS), (Vol. 1, pp. 97–104).

  3. Castelfranchi, C. (1995). Commitments: from individual intentions to groups and organizations. In Proceedings of the international conference on multiagent systems, (pages 41–48).

  4. Cheong, C., & Winikoff, M. (2009). Hermes: designing flexible and robust agent interactions (chapter 5). In V. Dignum (Ed.), Multi-agent systems—Semantics and dynamics of organizational models (pp. 105–139). Hershey, PA: IGI.

    Chapter  Google Scholar 

  5. Chesani, F., Mello, P., Montali, M., & Torroni, P. (2013). Representing and monitoring social commitments using the event calculus. Autonomous Agents and Multi-Agent Systems, 27(1), 85–130.

    Article  Google Scholar 

  6. Chopra, A. K., Dalpiaz, F., Giorgini, P., & Mylopoulos, J. (2010). Reasoning about Agents and Protocols via Goals and Commitments. In Proceedings of the 9th international conference on autonomous agents and multi-agent systems (AAMAS), (pp. 457–464).

  7. Dalpiaz, F., Chopra, A. K., Giorgini, P., & Mylopoulos, J. (2010). Adaptation in open systems: Giving interaction its rightful place. In J. Parsons, M. Saeki, P. Shoval, C. C. Woo, Y. Wand, (Eds.), Conceptual modeling - ER 2010, proceedings of the 29th international conference on conceptual modeling, Vancouver, BC, November 1—4, 2010, (Vol. 6412, pp. 31–45). Lecture Notes in Computer Science: Springer.

  8. Desai, N., Mallya, A. U., Chopra, A. K., & Singh, M. P. (2005). Interaction protocols as design abstractions for business processes. IEEE Transactions on Software Engineering, 31(12), 1015–1027.

    Article  Google Scholar 

  9. El-Menshawy, M., Bentahar, J., Qu, H., & Dssouli, R. (2011). On the verification of social commitments and time. In Proceedings of the tenth international conference on autonomous agents and multiagent systems, (pp. 483–490).

  10. Fornara, N., & Colombetti, M. (2002). Operational specification of a commitment-based agent communication language. In Proceedings of the first insternational conference on autonomous agents and multiagent systems, (pp. 536–542).

  11. Gerard, S. N., & Singh, M. P. (2013). Evolving protocols and agents in multiagent systems. In Proceedings of the twelfth international conference on autonomous agents and multiagent systems (AAMAS), (pp. 997–1004).

  12. Günay, A., Winikoff, M., & Yolum, P. (2013). Commitment protocol generation. In M. Baldoni, L. Dennis, V. Mascardi, & W. Vasconcelos (Eds.), Declarative agent languages and technologies X (Vol. 7784, pp. 136–152)., Lecture Notes in Computer Science Springer: Heidelberg.

    Chapter  Google Scholar 

  13. Johnson, M. W., McBurney, P., & Parsons, S. (2003). When are two protocols the same? Communication in multiagent systems, agent communication languages and conversation polocies (Vol. 2650, pp. 253–268)., Lecture Notes in Computer Science Heidelberg: Springer.

    Chapter  Google Scholar 

  14. Jonker, C. M., Hindriks, K. V., Wiggers, P., & Broekens, J. (2012). Negotiating agents. AI Magazine, 33(3), 79–91.

    Google Scholar 

  15. Mallya, A. U., & Singh, M. P. (2007). An algebra for commitment protocols. Autonomous Agents and Multi-Agent Systems, 14(2), 143–163.

    Article  Google Scholar 

  16. Marengo, E., Baldoni, M., Baroglio, C., Chopra, A. K., Patti, V., & Singh, M. P. (2011). Commitments with regulations: reasoning about safety and control in REGULA. In Proceedings of the 10th international conference on autonomous agents and multi-agent systems (AAMAS), (pp. 467–474).

  17. Pham, D. Q., & Harland, J. (2007). Temporal linear logic as a basis for flexible agent interactions. In E. H. Durfee, M. Yokoo, M. N. Huhns, & O. Shehory (Eds.), 6th International joint conference on autonomous agents and multiagent systems (AAMAS 2007), IFAAMAS, Honolulu, Hawaii, May 14–18, 2007, (pp. 124–131).

  18. Rosenschein, J. S., & Zlotkin, G. (1994). Rules of encounter. Cambridge: MIT Press.

    Google Scholar 

  19. Sabater, J., & Sierra, C. (2001). Regret: reputation in gregarious societies. In Proceedings of the fifth international conference on autonomous agents, (pp. 194–195).

  20. Sensoy, M., Zhang, J., Yolum, P., & Cohen, R. (2009). Poyraz: Context-aware service selection under deception. Computational Intelligence, 25(4), 335–366.

    Article  MathSciNet  Google Scholar 

  21. Singh, M. P. (1999). An ontology for commitments in multiagent systems. Artificial Intelligence and Law, 7(1), 97–113.

    Article  Google Scholar 

  22. Singh, M. P. (2011). Trust as dependence: A logical approach. In Proceedings of the 10th international conference on autonomous agents and multi-agent systems (AAMAS), (pp. 863–870).

  23. Teacy, W., Patel, J., Jennings, N., & Luck, M. (2006). TRAVOS: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems, 12(2), 183–198.

    Article  Google Scholar 

  24. Telang, P. R., & Singh, M. P. (2012). Comma: A commitment-based business modeling methodology and its empirical evaluation. In: V. Conitzer, M. Winikoff, L. Padgham, & W. van der Hoek, (Eds.), Proceedings of the eleventh joint international conference on autonomous agents and multi-agent systems (AAMAS 2012), (pp. 1073–1080).

  25. Telang, R. P., Meneguzzi, F., & Singh, M. P (2013). Hierarchical planning about goals and commitments. In Proceedings of the twelfth international conference on autonomous agents and multiagent systems, AAMAS, (pp. 877–884).

  26. Udupi, Y. B., & Singh, M. P. (2006). Contract enactment in virtual organizations: A commitment-based approach. In Proceedings of the twenty-first national conference on artificial intelligence, (pp. 722–727).

  27. Venkatraman, M., & Singh, M. P. (1999). Verifying compliance with commitment protocols. Autonomous Agents and Multi-Agent Systems, 2(3), 217–236.

    Article  Google Scholar 

  28. Winikoff, M. (2006). Implementing flexible and robust agent interactions using distributed commitment machines. Multiagent and Grid Systems, 2(4), 365–381.

    Google Scholar 

  29. Winikoff, M. (2007). Implementing commitment-based interactions. In Proceedings of the sixth international joint conference on autonomous agents and multiagent systems, AAMAS, (pp. 1–8).

  30. Winikoff, M., Liu, W., & Harland, J. (2004). Enhancing commitment machines. In J. Leite, A. Omicini, P. Torroni, & P. Yolum (Eds.), Declarative agent languages and technologies II (Vol. 3476, pp. 198–220)., Lecture Notes in Artificial Intelligence Heidelberg: Springer.

    Chapter  Google Scholar 

  31. Yolum, P. (2007). Design time analysis of multiagent protocols. Data and Knowledge Engineering, 63(1), 137–154.

    Article  Google Scholar 

  32. Yolum, P., & Singh, M. P. (2002). Flexible protocol specification and execution: Applying event calculus planning using commitments. In Proceedings of the first international conference on autonomous agents and multiagent systems, (pp. 527–534).

  33. Yolum, P., & Singh, M. P. (2007). Enacting protocols by commitment concession. In Proceedings of the sixth international conference on autonomous agents and multiagent systems, (pp. 116–123).

Download references

Acknowledgments

Akın Günay is partially supported by TÜBİTAK Scholarship (2211) and Turkish State Planning Organization (DPT) under the TAM Project, 2007K120610. Part of this work was done while Akın Günay was a PhD student in the Department of Computer Engineering of Bogazici University and visiting PhD student in the Department of Information Science of University of Otago. This work is partially supported by Bogazici University Research Fund under grant 13A01P2.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Winikoff.

Appendix: formal proofs

Appendix: formal proofs

This appendix provides the formal proofs for the theorems in Section 3.3.

Theorem 3

(Soundness) Algorithm 2 is sound (see Definition 9).

Proof

we need to show that the algorithm, when given a set of goals, generates commitments that are sufficient to ensure support for these goals. The algorithm closely follows the structure of Definition 8, and we prove the desired result by induction over the structure of the algorithm’s first argument.

  • Lines 1–2 of the algorithm correspond to the base case: if there are no propositions to be supported, then the agent’s goals (\(\top \)) are trivially supported by the empty protocol.

  • Lines 3–5 correspond to the second case: the condition \(d_1 \wedge d_2\) is supported if both \(d_1\) and \(d_2\) are supported, (and more generally, \(d_1 \wedge \cdots \wedge d_n\) is supported if all of the \(d_i\) are supported). By the induction hypothesis, the recursive calls to GoalBased yield sets of protocols \(P_1\) and \(P_2\) such that for \(d_1\) we have that for any \(p^1_i \in P_1 : {x, p^1_i} \Vdash {d_1}\), and respectively for \(d_2\) we have that for any \(p^2_j \in P_2 : {x, p^2_j} \Vdash {d_2}\). Consider now \(p_{ij} = p^1_i \cup p^2_j\) (recall that protocols are just sets of commitments, so they can be merged using set union). We have that \({x, p_{ij}} \Vdash {d_1}\) and \({x, p_{ij}} \Vdash {d_2}\) and therefore, by the second case of Definition 8, that \({x, p_{ij}} \Vdash {d_1 \wedge d_2}\) as desired. This holds for any selection of \(p^1_i\) and \(p^2_j\) which is exactly what the merge in line 5 does.

  • Lines 13–20 correspond to the first part of the last case of Definition 8 (agent using its own ability): The loop in line 13 finds all cases where the first part of the condition in Definition 8 is satisfied. Line 14 creates a fresh goal queue, and lines 15–17 decompose \(d\) into propositions. The recursive call in line 18 generates protocols \(P'\) such that (by inductive hypothesis) for all \(p \in P' : {x, p} \Vdash {d}\). Given this, and that (as per line 13) \(A_{x}({d}, {r'}) \in \mathcal {A}\) where \(r' \Rightarrow r\), by Definition 8 we conclude that for all \(p \in P' : {x, p} \Vdash {r}\) as desired.

  • Lines 21–34 correspond to the second part of the last case of Definition 8: The loops in lines 21–22 find all cases where \(S_{x}({y}, {d}, {r'}) \in \mathcal {B}\) (where \(r' \Rightarrow r\)) and \(I_{x}({y}, {w}, {r}) \in \mathcal {B}\). The next few lines create a fresh goal queue, and decompose \(d\) into propositions, inserting them into the goal queue, and then (line 27) also inserting \(w\) into the goal queue. The recursive call in line 28 thus, by induction hypothesis, generates a set of protocols \(P\) such that for any \(p \in P : {x, p} \Vdash {d \wedge w}\). We then define \(P' = \{ p \cup \{C({y}, {x}, {d \wedge w}, {r})\} \; | \; p \in P \}\). By Definition 8 we then conclude that for any \(p' \in P'\), we have that \({x, p'} \Vdash {r}\) as desired.\(\square \)

Theorem 4

(Completeness) Algorithm 2 is complete (see Definition 11).

Proof

Algorithm 2 follows Definition 10, and the proof, by induction over the structure of the first argument to the algorithm, follows the algorithm’s structure.

  • The first case of Definition 10 corresponds to lines 1–2: if there are no conditions to be supported, then a single empty protocol is returned. This meets the completeness requirement: the only minimal commitment set in this case is the empty set, and this is exactly what the algorithm returns.

  • The second case corresponds to lines 3–5: given \(d_i \wedge d_j\) the algorithm is called recursively to obtain support for each of the conjuncts. By the induction hypothesis we have that \(P_i\) and \(P_j\) (respectively the set of protocols that support \(d_i\) and \(d_j\)) contain all (and only) minimal commitment sets. The merge in line 5 selects \(p \in P_i\) and \(p' \in P_j\) and merges them (\(p \cup p'\)) in line with Definition 10. Hence the algorithm, which considers all possible combinations of \(p\) and \(p'\), generates exactly all possible minimal protocols that support \(d_i \wedge d_j\).

  • The first part of the last case corresponds to lines 13–20: by induction hypothesis the recursive call generates all minimal commitment sets that support \(d\), and, by Definition 10 these are exactly the ones that support \(r\) in this case, which is what the algorithm returns.

  • The final part of the last case corresponds to lines 21–34: by the induction hypothesis the recursive call generates all minimal commitment sets that support \(d \wedge w\). The algorithm then considers these commitment sets, and adds the extra commitment \(C({y}, {x}, {d\wedge w}, {r})\) to each one, yielding exactly the complete collection of minimal commitment sets for \(r\). \(\square \)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Günay, A., Winikoff, M. & Yolum, P. Dynamically generated commitment protocols in open systems. Auton Agent Multi-Agent Syst 29, 192–229 (2015). https://doi.org/10.1007/s10458-014-9251-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10458-014-9251-7

Keywords

Navigation