Agreement Technologies

Applying Theory of Mind to multi-agent systems enables agents to model and reason about other agents’ minds. Recent work shows that this ability could increase the performance of agents, making them more efficient than agents that lack this ability. However, modelling others agents’ minds is a difficult task, given that it involves many factors of uncertainty, e.g., the uncertainty of the communication channel, the uncertainty of reading other agents correctly, and the uncertainty of trust in other agents. In this paper, we explore how agents acquire and update Theory of Mind under conditions of uncertainty. To represent uncertain Theory of Mind, we add probability estimation on a formal semantics model for agent communication based on the BDI architecture and agent communication languages.

[1]  Viviane Torres da Silva,et al.  Detection and resolution of normative conflicts in multi-agent systems: a literature survey , 2018, Autonomous Agents and Multi-Agent Systems.

[2]  Marcel Antal,et al.  Blockchain Based Decentralized Management of Demand Response Programs in Smart Energy Grids , 2018, Sensors.

[3]  Richard M. Murray,et al.  Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.

[4]  Catholijn M. Jonker,et al.  Results of the First Annual Human-Agent League of the Automated Negotiating Agents Competition , 2018, IVA.

[5]  Jean-Luc Baril,et al.  Blockchain based trust & authentication for decentralized sensor networks , 2017, ArXiv.

[6]  Wamberto Weber Vasconcelos,et al.  Resolving conflict and inconsistency in norm-regulated virtual organizations , 2007, AAMAS '07.

[7]  Vivy Suhendra A Survey on Access Control Deployment , 2011, FGIT-SecTech.

[8]  Ewa Roszkowska,et al.  The Application of UTA Method for Support Evaluation Negotiation Offers , 2016 .

[9]  Duy Van Nguyen,et al.  Global maximization of UTA functions in multi-objective optimization , 2013, Eur. J. Oper. Res..

[10]  Tiago M. Fernández-Caramés,et al.  A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.

[11]  Wamberto Weber Vasconcelos,et al.  Normative conflict resolution in multi-agent systems , 2009, Autonomous Agents and Multi-Agent Systems.

[12]  Yasser F. O. Mohammad,et al.  FastVOI: Efficient Utility Elicitation During Negotiations , 2018, PRIMA.

[13]  Antônio A. de A. Rocha,et al.  A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack , 2018, Secur. Commun. Networks.

[14]  J. Neumann,et al.  Theory of games and economic behavior , 1945, 100 Years of Math Milestones.

[15]  Juan Carlos Losada,et al.  Robust Distributed Voting Mechanism by Consensus , 2018, 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[16]  Giovanni Sartor,et al.  Normative conflicts in legal reasoning , 1992, Artificial Intelligence and Law.

[17]  Marek Sergot,et al.  A computational theory of normative positions , 2001, ACM Trans. Comput. Log..

[18]  R. M. Hare,et al.  Norm and Action: A Logical Enquiry. , 1965 .

[19]  J. Siskos Assessing a set of additive utility functions for multicriteria decision-making , 1982 .

[20]  Pablo Noriega,et al.  Distributed norm management for multi-agent systems , 2012, Expert Syst. Appl..

[21]  Ingmar Pörn,et al.  The logic of power , 1970 .

[22]  N. Kshetri Blockchain's roles in strengthening cybersecurity and protecting privacy , 2017 .

[23]  Qi Yong,et al.  Protecting Outsourced Data Privacy with Lifelong Policy Carrying , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[24]  R. L. Keeney,et al.  Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.

[25]  Alec Wolman,et al.  Policy-Carrying Data: A Privacy Abstraction for Attaching Terms of Service to Mobile Data , 2015, HotMobile.

[26]  S. Rosenschein,et al.  On social laws for artificial agent societies: off-line design , 1996 .

[27]  Yury Orlov,et al.  Consensus-based leader-follower tracking for a network of perturbed diffusion PDEs via local boundary interaction* , 2016 .

[28]  Primavera De Filippi,et al.  Decentralized Blockchain Technology and the Rise of Lex Cryptographia , 2015 .

[29]  Catholijn M. Jonker,et al.  Can We Reach Pareto Optimal Outcomes Using Bottom-Up Approaches? , 2016, COREDEMA@ECAI.

[30]  Catholijn M. Jonker,et al.  An agent architecture for multi-attribute negotiation using incomplete preference information , 2007, Autonomous Agents and Multi-Agent Systems.

[31]  M. Rabin Published by: American , 2022 .

[32]  Denis Hock,et al.  Defense Strategies against Byzantine Attacks in a Consensus-Based Network Intrusion Detection System , 2017, Informatica.

[33]  Marco Colombetti,et al.  An Event Driven Approach to Norms in Artificial Institutions , 2005, AAMAS Workshops.

[34]  A. Sen,et al.  Collective Choice and Social Welfare , 2017 .

[35]  Feng Tian,et al.  An agri-food supply chain traceability system for China based on RFID & blockchain technology , 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM).