Extensions on Interaction Laws in Open Multi-Agent Systems Gustavo Carvalho

Slides:



Advertisements
Similar presentations
Towards an Integration Test Architecture for Open MAS
Advertisements

Workpackage 2: Norms
Architecture Representation
Database Systems: Design, Implementation, and Management Tenth Edition
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 12Slide 1 Software Design l Objectives To explain how a software design may be represented.
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
Basic Concepts in Component-Based Software Engineering
Effective Coordination of Multiple Intelligent Agents for Command and Control The Robotics Institute Carnegie Mellon University PI: Katia Sycara
Adding Organizations and Roles as Primitives to the JADE Framework NORMAS’08 Normative Multi Agent Systems, Matteo Baldoni 1, Valerio Genovese 1, Roberto.
Flexible Regulation of Virtual Enterprises Naftaly Minsky Rutgers University Joint work with Xuhui Ao.
Developing MAS The GAIA Methodology A Brief Summary by António Castro and Prof. Eugénio Oliveira.
Automated Analysis and Code Generation for Domain-Specific Models George Edwards Center for Systems and Software Engineering University of Southern California.
Naftaly Minsky Rutgers University Law-Governed Interaction: a Decentralized Access-Control Mechanism.
Quality of Service in IN-home digital networks Alina Albu 23 October 2003.
A Model-Driven Framework for Architectural Evaluation of Mobile Software Systems George Edwards Dr. Nenad Medvidovic Center.
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
The Software Development Life Cycle: An Overview
*Law and Coordination Rodrigo Paes. © LES/PUC-Rio Agenda Integration Coordination BPEL example Birth *Law and Coordination Further Steps.
1 Autonomic Computing An Introduction Guenter Kickinger.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
1/19 Component Design On-demand Learning Series Software Engineering of Web Application - Principles of Good Component Design Hunan University, Software.
A Modeling Language to Model Norms Karen Figueiredo Viviane Torres da Silva Universidade Federal Fluminense (UFF)
Engineering Law-Governed Approaches How to reuse, extend and compose interaction specifications Gustavo Carvalho, Carlos Lucena
TC Methodology Massimo Cossentino (Italian National Research Council) Radovan Cervenka (Whitestein Technologies)
Sweetening Regulated Open Multi-Agent Systems with a Formal Support for Agents to Reason About Laws Carolina Howard Felicíssimo Key points of my paper.
Architecture-Based Runtime Software Evolution Peyman Oreizy, Nenad Medvidovic & Richard N. Taylor.
© Yilmaz “Agent-Directed Simulation – Course Outline” 1 Course Outline Dr. Levent Yilmaz M&SNet: Auburn M&S Laboratory Computer Science &
Governance in Multi-Agent Systems Using Testimonies to Enforce the Behavior of Agents Fernanda Duran, Viviane Torres da Silva.
Introduction to MDA (Model Driven Architecture) CYT.
Assessing the Suitability of UML for Modeling Software Architectures Nenad Medvidovic Computer Science Department University of Southern California Los.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 20 Object-Oriented.
Contextual Regulations in Open Multi-Agent Systems Carolina Howard Felicíssimo Advisor: Prof. Carlos José Pereira de Lucena.
Argumentation and Trust: Issues and New Challenges Jamal Bentahar Concordia University (Montreal, Canada) University of Namur, Belgium, June 26, 2007.
Formalizing the Asynchronous Evolution of Architecture Patterns Workshop on Self-Organizing Software Architectures (SOAR’09) September 14 th 2009 – Cambrige.
Model-Driven Analysis Frameworks for Embedded Systems George Edwards USC Center for Systems and Software Engineering
© DATAMAT S.p.A. – Giuseppe Avellino, Stefano Beco, Barbara Cantalupo, Andrea Cavallini A Semantic Workflow Authoring Tool for Programming Grids.
A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach.
On the Modularity Assessment of Aspect- Oriented Multi-Agent Systems Product Lines: a Quantitative Study Camila Nunes
Intelligent agents, ontologies, simulation and environments for norm-regulated MAS Deliberative Normative Agents Ricardo Gralhoz Governance in Open Multi-Agent.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Interaction Laws Verification Using Knowledge-based Reasoning Gustavo Carvalho, Anarosa Brandão, Rodrigo Paes & Carlos Lucena By Regiane Lima.
Class 5 Architecture-Based Self-Healing Systems David Garlan Carnegie Mellon University.
Chapter 10 Analysis and Design Discipline. 2 Purpose The purpose is to translate the requirements into a specification that describes how to implement.
Modeling Component-based Software Systems with UML 2.0 George T. Edwards Jaiganesh Balasubramanian Arvind S. Krishna Vanderbilt University Nashville, TN.
Design Concepts By Deepika Chaudhary.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
FDT Foil no 1 On Methodology from Domain to System Descriptions by Rolv Bræk NTNU Workshop on Philosophy and Applicablitiy of Formal Languages Geneve 15.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Logical view –show classes and objects Process view –models the executables Implementation view –Files, configuration and versions Deployment view –Physical.
A Quantitative Trust Model for Negotiating Agents A Quantitative Trust Model for Negotiating Agents Jamal Bentahar, John Jules Ch. Meyer Concordia University.
1 Object Oriented Logic Programming as an Agent Building Infrastructure Oct 12, 2002 Copyright © 2002, Paul Tarau Paul Tarau University of North Texas.
An Event-Driven High Level Model for the Specification of Laws in Open Multi-Agent Systems Rodrigo Paes
A Mediated Approach towards Web Service Choreography Michael Stollberg, Dumitru Roman, Juan Miguel Gomez DERI – Digital Enterprise Research Institute
Self-Adaptive Embedded Technologies for Pervasive Computing Architectures Self-Adaptive Networked Entities Concept, Implementations,
Analysis Yaodong Bi. Introduction to Analysis Purposes of Analysis – Resolve issues related to interference, concurrency, and conflicts among use cases.
Survey of Tools to Support Safe Adaptation with Validation Alain Esteva-Ramirez School of Computing and Information Sciences Florida International University.
2000 Research Overview Dr. Kim Mens Programming Technology Lab Vrije Universiteit Brussel.
Data Models. 2 The Importance of Data Models Data models –Relatively simple representations, usually graphical, of complex real-world data structures.
1 Security and Dependability Organizational Patterns - A Proof of Concept Demo for SERENITY A. Saidane, F. Dalpiaz, V.H. Nguyen, F. Massacci.
Context-Aware Middleware for Resource Management in the Wireless Internet US Lab 신현정.
Chapter 1: Introduction to Systems Analysis and Design
Distribution and components
Model-Driven Analysis Frameworks for Embedded Systems
Chapter 20 Object-Oriented Analysis and Design
Chapter 1: Introduction to Systems Analysis and Design
Dept. of Computation, UMIST
Chapter 1: Introduction to Systems Analysis and Design
Presentation transcript:

Extensions on Interaction Laws in Open Multi-Agent Systems Gustavo Carvalho

© LES/PUC-Rio Outline XMLaw in a Nutshell Open questions –How to design open systems for extensions? How to structure better the law elements? Which formalism is better suited to support for law extension consistency? Does our event model help extensibility? Ongoing research status CARVALHO, Gustavo; PAES, Rodrigo; LUCENA, Carlos. Extensions on Interaction Laws in Open Multi-Agent Systems. In: Software Engineering for Agent-oriented Systems (SEAS 05). Uberlândia, Brasil

XMLaw in a Nutshell Gustavo Carvalho

© LES/PUC-Rio Difficulties with Open MASs How to interact with agents that: –we know little, if anything, about them –whom we do not trust? How does one reason about such a system? How does one protect the system from buggy agents? Or from agents with a different agendas? Etc.

© LES/PUC-Rio Laws acting on interactions Agent A Agent B Laws interaction Organization defines

© LES/PUC-Rio The Computational Conceptual Model Set of concepts to represent interactions

© LES/PUC-Rio Ping Pong Example – XMLaw

© LES/PUC-Rio Event model Relationship among the elements of the conceptual model is mostly based on events Chain of causes and consequences ElementEventElement generatesperceives

© LES/PUC-Rio Interaction model Law infrastructure Interception

© LES/PUC-Rio Interaction model Law infrastructure Law enforcement

© LES/PUC-Rio Interaction model Law infrastructure Redirection

Recent research… Gustavo Carvalho

© LES/PUC-Rio Open Multi-Agent Systems How to design open systems for extensions? –As software systems need to be customized according to different purposes and peculiarities, it should be possible to express extensions over interactions of software agents. Open MAS should be specified and developed to facilitate extensions on interaction protocols. Law-governed approaches should also present a solution to this challenge. –Interaction specification = interaction protocol + law elements

© LES/PUC-Rio Example Protocol Extension Contract Net with Confirmation Protocol Holonic Contract Net with Confirmation Protocol Time outs? Norms? Filters?

© LES/PUC-Rio Dimensions Interaction Model –Protocol specification Control infrastructure Agent implementation

Extension support for laws

© LES/PUC-Rio Extension support for laws 1.Review the separation of law elements 2.Law lifecycle and consistency 3.Extension Mechanism

© LES/PUC-Rio Extension support for laws (I) How to structure better law elements? Is it possible to separate the specification of protocol, norms, roles,...? V. Dignum, J.-J. Meyer, H. Weigand, and F. Dignum. An organization-oriented model for agent societies. In Proceedings of RASTA (at AAMAS'OZ) –Description –Rules and Interaction Structure –Time period –Price / Conditions of action of each agent –Sanction J. Vazquez-Salceda, H. Aldewereld, and F. Dignum. Norms in multiagent systems: some implementation guidelines. In Second European Workshop on Multi-Agent Systems, pages , Barcelona, –Norm condition –Violation condition –Detection mechanism –Sanction –Repair

© LES/PUC-Rio Extension support for laws (II) Consistency Development phase –Design-time –Runtime Law lifecycle –Inclusion of element –Removal of element –Replacement of element Consistency - Formalism Support for Law Extension –How state machines + time can support the extension on laws in open MAS? –How prolog + time can support the extension on laws in open MAS? How transaction frame logic can support the extension on laws in open MAS? –How -calculus can support the extension on laws in open MAS? –Joint work with Carol regarding defeasible logic and description logic...

© LES/PUC-Rio Formalism - Related Work The SOCS (SOcieties of ComputeeS) project aims at providing a solid scientific foundation for the design of Global Computing systems. –A computational logic model for the description, analysis and verifi cation of global and open societies of heterogeneous computees Global Computing is a new technological vision where computing environments are composed of autonomous computational entities whose activity is not centrally controlled but is decentralised instead, either because global control is impossible or at times impractical, or because the entities are created or controlled by different owners. The computational entities may also be mobile, and the environment is open and evolves over time. Moreover, the behaviour of the entities may be heterogeneous and vary over time, and the entities may need to operate with incomplete information about the environment. SOCS objectives –To deliver novel descriptions of computational Global Computing entities, with heterogeneous knowledge, goals, and patterns of behaviour and interaction. –To describe systems of such entities, capable of interacting in a global, open, and dynamically changing Global Computing environment. –To provide tools for the specification, analysis and verifi cation of properties of entities and their systems.

© LES/PUC-Rio Formalism - Related work JESS is used to implement norms Andres Garcia-Camino, Pablo Noriega, and Juan Antonio Rodriguez-Aguilar. Implementing Norms in Electronic Institutions. In Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, 2005

© LES/PUC-Rio Extension support for laws (III) Extension Mechanism Extension Mechanism –Enabling and disabling elements ( Event Model ) –Inheritance –Extension by hierarchy –Extension by completion ( Hooks )

© LES/PUC-Rio Enabling and Disabling elements Does our event model help extensibility?

© LES/PUC-Rio Inheritance - Extension Mechanism Kuwabara, K., Ishida, T., and Osato, N.: "AgenTalk: Describing Multiagent Coordination Protocols with Inheritance", Proc. 7th IEEE International Conference on Tools with Artificial Intelligence (ICTAI '95) p.460-p.465 (1995)

© LES/PUC-Rio Hierarchy – Extension Mechanism Minsky proposes a coordination and control mechanism called law governed interaction (LGI). This mechanism is based in two basic principles: the local nature of the LGI laws and a decentralization of law enforcement. It provides a language to specify laws and it is concerned with architectural decisions to achieve a high degree of robustness. Ao and Minksy (2003) propose an approach to enhance LGI with the concept of policy- hierarchy to support that different internal policies are formulated independently of each other, achieving by this means a flexibility support. Differently from our approach, Ao and Minsky consider confidentiality as a requirement for their solution. The extensions that we have presented until now has the goal of supporting open system law maintenance, instead of flexibility for confidentiality purpose. Xuhui Ao and Naftaly Minsky. Flexible Regulation of Distributed Coalitions. In Proc. of the 8th European Symposium on Research in Computer Security (ESORICS). Gjøvik Norway, October 2003.

© LES/PUC-Rio Extensions on Interaction Laws We propose that the interaction specification be annotated using extension points and that the expected behavior of the agents be specified using laws. Independently of extension points, the compliance of the system to the specification must continue to be analyzed by a mechanism that governs the laws of interactions in open MAS. For this purpose, we extended the XMLaw description language [Paes et al., 2005a] to map the specification of interaction rules into a governance mechanism and we enhanced it with support for extension points. CARVALHO, Gustavo; PAES, Rodrigo; LUCENA, Carlos. Extensions on Interaction Laws in Open Multi-Agent Systems. In: Software Engineering for Agent-oriented Systems (SEAS 05). Uberlândia, Brasil

© LES/PUC-Rio Research Status We have included the notion of extension points in the XMLaw. The extension points allow the modification of the interaction laws with services (action element) that could be activated by a law and with filters (constraint element) that could validate or not a law. –This is a first step towards using variations and laws to specify extensions points in open system interactions. We intend to evaluate how we can use extensions to protocols, norms, scenes, and any other element.

© LES/PUC-Rio Explanation… Conceptual Model

© LES/PUC-Rio Constraint Constraints are restrictions over norms or transitions and generally specify filters for events, constraining the allowed values for a specific attribute of an event. –For instance, a constraint can describe what the allowed values for specific attributes are. It can filter the event that is not conform to this rule.

© LES/PUC-Rio Constraint Constraints are implemented using Java code. –Developers are free to build as complex constraints as needed for their applications. –The Constraint element defines the class attribute that indicates the java class that implements the filter. The class is called when a transition or a norm is supposed to fire, and basically the constraint analyzes if the message values or any other events’ attributes are valid.

© LES/PUC-Rio Constraint Code public class CheckValidDay extends AbstractConstraint { public CheckValidDay(InfoCarrier info) { super(info); } public boolean constrain(InfoCarrier info) { /* manipulate data */ if ( /*check conditions*/ ) return true; else return false; }

© LES/PUC-Rio Transitions and Constraints ab anId = true m ab anId = false m

© LES/PUC-Rio Norm Norms and Constraints Norm anId = trueanId = false Norm Norm Activated Norm Deactivated

© LES/PUC-Rio Action Environment actions are domain-specific Java code that runs integrated with XMLaw specifications. –Actions can be used to plug services in an environment. –For instance, an environment can call a debit service from a bank agent to automatically charge the purchase of a good in a negotiation.

© LES/PUC-Rio Action Structure Since actions are also a XMLaw element, they can be activated by any XMLaw event such as transition activation, norm activation, and even action activation. –The class attribute of an Action specifies the java class in charge of the functionality implementation. –The Element tag references the events that activate this action, and as many Element tags as needed can be defined to trigger an action.

© LES/PUC-Rio Action Code public class KeepRFQAction extends ActionExecution { public KeepRFQAction(Id id, InfoCarrier info, TriggerDescriptor generator) { super(id, info, generator); } public void execute(InfoCarrier infoCarrier) throws LawException { /* action implementation */ }

© LES/PUC-Rio TAC SCM Variability - Summary

© LES/PUC-Rio Governance Variations in XMLaw Law customization is done by a step-wise refinement, that is, interaction specification is extensible via law addition, law replacement, or law removal. Until know, our research was focused on plugging actions and constraints components in the law specification. –Two phases: Other elements definition + specification of hooks Hook instantiation → component assignment

© LES/PUC-Rio Hooks No class reference

© LES/PUC-Rio Transition with hook No class reference

© LES/PUC-Rio Constraint Refinement...

© LES/PUC-Rio Permission with hooks Assembler No class reference

© LES/PUC-Rio Permission Refinement …...

© LES/PUC-Rio Obligation Assembler

© LES/PUC-Rio Obligation - Refinement Assembler Element inclusion

© LES/PUC-Rio Next Steps Continue to identify and evaluate extension mechanisms –Skeletons from Munindar Singh –Abstract Laws from Frank Dignum –Hierarchical levels of specification from Virginia Dignum Design how this feature can enhance XMLaw –Review the structure of law elements “Small Experiment” –Contract net protocol and its variations “Formalism Group” - Alberto Sardinha, Carol and Guga –Evaluation of description/defeasible logic, jess and transaction frame logic –Guga: Which formalism is better suited to support for law extension consistency?

Questions?? Gustavo Carvalho