5 research outputs found

    Toward an interdisciplinary theory of coordination

    Get PDF
    Includes bibliographical references (p. 37-45).Research supported by Digital Equipment Corporation. Research supported by the National Science Foundation. IRI-8805798 IRI-8903034 Research supported by the MIT International Financial Services Research Center. Research supported by General Motors/Electronic Data Systems.Thomas W. Malone, Kevin Crowston

    Distributed physical simulations and synchronization in virtual environments

    Get PDF
    Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Architecture, 1993.Includes bibliographical references (leaves 59-61).by Martin Richard Friedmann.M.S

    The interdisciplinary study of coordination

    Get PDF
    Includes bibliographical references (p. 43-53).by Thomas Malone and Kevin Crowston

    Proceedings Spring 1990 Network Topics Course

    Get PDF
    Coordinated Science Laboratory was formerly known as Control Systems Laborator

    Political artifacts and personal privacy : the Yenta multi-agent distributed matchmaking system

    Get PDF
    Thesis (Ph.D.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 1999.Includes bibliographical references (p. 119-128).Technology does not exist in a social vacuum. The design and patterns of use of any particular technological artifact have implications both for the direct users of the technology, and for society at large. Decisions made by technology designers and implementors thus have political implications that are often ignored. If these implications are not made a part of the design process, the resulting effects on society can be quite undesirable. The research advanced here therefore begins with a political decision: It is almost always a greater social good to protect personal information against unauthorized disclosure than it is to allow such disclosure. This decision is expressly in conflict with those of many businesses and government entities. Starting from this premise, a multi-agent architecture was designed that uses both strong cryptography and decentralization to enable a broad class of Internet-based software applications to handle personal information in a way that is highly resistant to disclosure. Further, the design is robust in ways that can enable users to trust it more easily: They can trust it to keep private information private, and they can trust that no single entity can take the system away from them. Thus, by starting with the explicit political goal of encouraging well-placed user trust, the research described here not only makes its social choices clear, it also demonstrates certain technical advantages over more traditional approaches. We discuss the political and technical background of this research, and explain what sorts of applications are enabled by the multi-agent architecture proposed. We then describe a representative example of this architecture--the Yenta matchmaking system. Yenta uses the coordinated interaction of large numbers of agents to form coalitions of users across the Internet who share common interests, and then enables both one-to-one and group conversations among them. It does so with a high degree of privacy, security, and robustness, without requiring its users to place unwarranted trust in any single point in the system.by Leonard Newton Foner.Ph.D
    corecore