146 research outputs found
Recommended from our members
A Study of Agent Influence in Nested Agent Interactions
This work develops a theory of agent influence and applies it to a coached system of simple reactive agents. Our notion of influence is intended to describe agent ability which is contingent on the actions of other agents and we view such behaviours as being “nested”. An agent may have the ability to make A hold only if another agent has carried out a particular action. Our analysis of this is based on a combination of the observation of the effects of an agent’s actions in a bounded environment and observations on what may be changed in that environment and is intended to allow for a logical representation of nested behaviours. We build on this notion to develop a theory of influence which we offer as an extension of existing systems for representing agency and its effects.
The notion of an agent being able to “see to it” that something is brought about has been a useful device for reasoning about agent ability. These so-called STIT semantics have been developed by a number of researchers. Standard STIT semantics allow statements of the form [α stit: A] which says that agent a has the ability to see to it that A holds. Although based on the concept of agent action STIT semantics also allow for the representation of concepts involving what may be thought of as inaction. An agent deciding, for example, not to execute a particular action may be characterised as seeing to it that it does not see to it that A, [α stit: [α stit: -A]]. STIT encourages nesting and although this nesting extends across actions within an agent it does not extend easily across agents. So called other agent statements of the form [β stit: [α stit: A]] do not make sense in standard stit semantics because β seeing to it that α sees to it that A holds implies that β has some dominion over a which, in turn, compromises α’s agency. Although the statement makes no sense under standard STIT it does make sense in an intuitive way and Brian Chellas [31] notes that it would be:
“...bizarre to deny that an agent should be able to see to it that another agent sees to something”
This is also mentioned in Belnap et al. [8, page 275]. Chellas is correct and there are numerous settings in which other agent STIT does make sense. These settings, which are captured in various readings of STIT, may bring a great deal of system level overhead. In a normative system, for example, β may have the option of imposing a sanction on α if α fails to bring about A and in this sense may be thought of as seeing to it that α sees to it that A holds. Similarly a deontic reading may place β in a position where it is able to place an obligation on α to bring about A. These readings allow for sensible interpretation of other agent STIT but the examples above require that agents have sufficient awareness of personal utility be able to manage sanctions or that they are able to reason about obligations. These readings offer nothing for simple agents with limited resources and abilities.
We offer another reading for the STIT element, one based on the concept of agent influence and one which carries minimal system level overhead. Because influence may be contingent on simultaneous or sequential behaviour by a number of agents it is extendible across agents and offers a means of addressing other agent statements. We extend the standard STIT semantics of Horty, Belnap and others with the introduction of “leads to” and “may lead to” operators which allow us to move our analysis into a setting where observation provides evidence of influence. We then explore the manifestation of influence in a number of scenarios. After exploring how influence manifests itself we then offer a partial logical characterisation of the influence operators and discuss its relationship with standard STIT.
Building on these semantics and the partial logical characterisation we then explore the practical use of our theory of influence in an agent learning system. We describe experiments with a system specified by safety and liveness properties and having two broad classes of agents, actors and coaches. Actor agents will manipulate their environment and coaching agents will observe the actor’s behaviour and its effects using aggregated observations to generate new behaviours which are then seeded in the environment to modify actor behaviour.
We then offer a discussion and evaluation of our theory and its applications indicating where it may be further developed and applied
Search-based system architecture development using a holistic modeling approach
This dissertation presents an innovative approach to system architecting where search algorithms are used to explore design trade space for good architecture alternatives. Such an approach is achieved by integrating certain model construction, alternative generation, simulation, and assessment processes into a coherent and automated framework. This framework is facilitated by a holistic modeling approach that combines the capabilities of Object Process Methodology (OPM), Colored Petri Net (CPN), and feature model. The resultant holistic model can not only capture the structural, behavioral, and dynamic aspects of a system, allowing simulation and strong analysis methods to be applied, it can also specify the architectural design space. Both object-oriented analysis and design (OOA/D) and domain engineering were exploited to capture design variables and their domains and define architecture generation operations. A fully realized framework (with genetic algorithms as the search algorithm) was developed. Both the proposed framework and its suggested implementation, including the proposed holistic modeling approach and architecture alternative generation operations, are generic. They are targeted at systems that can be specified using object-oriented or process-oriented paradigm. The broad applicability of the proposed approach is demonstrated on two examples. One is the configuration of reconfigurable manufacturing systems (RMSs) under multi-objective optimization and the other is the architecture design of a manned lunar landing system for the Apollo program. The test results show that the proposed approach can cover a huge number of architecture alternatives and support the assessment of several performance measures. A set of quality results was obtained after running the optimization algorithm following the proposed framework --Abstract, page iii
Qualitatively modelling genetic regulatory networks : Petri net techniques and tools
The development of post-genomic technologies has led to a paradigm shift in the way we study genetic regulatory networks (GRNs) - the underlying systems which mediate cell function. To complement this, the focus is on devising scalable, unambiguous and automated formal techniques for holistically modelling and analysing these complex systems. Quantitative approaches offer one possible solution, but do not appear to be commensurate with currently available data. This motivates qualitative approaches such as Boolean networks (BNs) , which abstractly model the system without requiring such a high level of data completeness. Qualitative approaches enable fundamental dynamical properties to be studied, and are well-suited to initial investigations. However, strengthened formal techniques and tool support are required if they are to meet the demands of the biological community. This thesis aims to investigate, develop and evaluate the application of Petri nets (PNs) for qualitatively modelling and analysing GRNs. PNs are well-established in the field of computer science, and enjoy a number of attractive benefits, such a wide range of techniques and tools, which make them ideal for studying biological systems. We take an existing qualitative PN approach for modelling GRNs based on BNs, and extend it to more general models based on multi-valued networks (MVNs). Importantly, we develop tool support to automate model construction. We illustrate our approach with two detailed case studies on Boolean models for carbon stress in Escherichia coli and sporulation in Bacillus subtilis, and then consider a multi-valued model of the former. These case studies explore the analysis power of PN s by exploiting a range of techniques and tools. A number of behavioural differences are identified between the two E. coli models which lead us to question their formal relationship. We investigate this by proposing a framework for reasoning about the behaviour of MVNs at different levels of abstraction. We develop tool support for practical models, and show a number of important results which motivate the need for multi-valued modelling. Asynchronous BN s can be seen to be more biologically realistic than their synchronous counterparts. However, they have the drawback of capturing behaviour which is unrealisable in practice. We propose a novel approach for refining such behaviour using signal transition graphs, a PN formalism from asynchronous circuit design. We automate our approach, and demonstrate it using a BN of the lysis-lysogeny switch in phage A. Our results show that a more realistic asynchronous model can be derived which preserves the stochastic switch.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
Foundations of Software Science and Computation Structures
This open access book constitutes the proceedings of the 23rd International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2020, which took place in Dublin, Ireland, in April 2020, and was held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020. The 31 regular papers presented in this volume were carefully reviewed and selected from 98 submissions. The papers cover topics such as categorical models and logics; language theory, automata, and games; modal, spatial, and temporal logics; type theory and proof theory; concurrency theory and process calculi; rewriting theory; semantics of programming languages; program analysis, correctness, transformation, and verification; logics of programming; software specification and refinement; models of concurrent, reactive, stochastic, distributed, hybrid, and mobile systems; emerging models of computation; logical aspects of computational complexity; models of software security; and logical foundations of data bases.
Foundations of Software Science and Computation Structures
This open access book constitutes the proceedings of the 23rd International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2020, which took place in Dublin, Ireland, in April 2020, and was held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020. The 31 regular papers presented in this volume were carefully reviewed and selected from 98 submissions. The papers cover topics such as categorical models and logics; language theory, automata, and games; modal, spatial, and temporal logics; type theory and proof theory; concurrency theory and process calculi; rewriting theory; semantics of programming languages; program analysis, correctness, transformation, and verification; logics of programming; software specification and refinement; models of concurrent, reactive, stochastic, distributed, hybrid, and mobile systems; emerging models of computation; logical aspects of computational complexity; models of software security; and logical foundations of data bases.
PSA 2018
These preprints were automatically compiled into a PDF from the collection of papers deposited in PhilSci-Archive in conjunction with the PSA 2018
PSA 2018
These preprints were automatically compiled into a PDF from the collection of papers deposited in PhilSci-Archive in conjunction with the PSA 2018
Recommended from our members
Distributed Termination Detection For Multiagent Protocols
The research conducted in this thesis is on distributed termination detection in multiagent systems.
Agents engage in complex interactions by executing behaviour specifications in the form of protocols. This work presents and experiments with a framework for making termination in a multiagent system explicit. As a side effect, the mechanism can be exploited to aid management of agent interactions, by providing visibility of the interaction process and can be extended to drive multiagent system management tasks such as timely garbage collection.
Results from previous attempts to deploy agents systems when scaling up, e.g. Agentcities, have shown and exposed a big gap between theory and practice especially in the reliability and availability of deployed systems. In particular more work needs to be done in the area of supporting agent infrastructures as much as in theoretical agent foundations.
There are two aspects to this problem of termination detection in multiagent systems, firstly, the formal verification of behaviour at compile-time and secondly, monitoring and control at run-time. Regarding the former, there has been some work on the ver- 13 ification of agent communication languages. But overall verification is difficult and often requires knowledge of internal states of agents at compile time, and as yet has not been satisfactorily solved to be deployed in real systems. The second, the runtime approach is adopted in here.
The research is not about protocol engineering but assumes correct protocols, and protocol specifications to be finite state machine graphs. Given these correct verified protocols, the thesis proposes a number of definitions culminating in identification of minimal information in the form of sub-protocols that agents being autonomous, can make available for the termination detection. An off line procedure for deriving these sub-protocols is then presented.
The thesis then considers a termination detection model, and within this model, proposes an conversationmodel encompassing protocol executions, with hierarchical conversations modelled as diffusing computation trees and defines a number of predicates to derive termination in centralised and distributed environments. Algorithms that implement these predicates are sketched and some complexity analysis is performed. The thesis then considers a prototype implementation evaluated over some defined detection delays metric.
The evaluation approach is heavily empirical, with an experimental approach adopted to evaluate various configurations of the termination detection mechanism. The evaluation employs robust resampling and bootstrapping methods to analyse and obtain distributions and confidence intervals of the detection delays metric for the termination detection mechanism
- …