36,536 research outputs found

    KEMNAD: A Knowledge Engineering Methodology for Negotiating Agent Development

    Get PDF
    Automated negotiation is widely applied in various domains. However, the development of such systems is a complex knowledge and software engineering task. So, a methodology there will be helpful. Unfortunately, none of existing methodologies can offer sufficient, detailed support for such system development. To remove this limitation, this paper develops a new methodology made up of: (1) a generic framework (architectural pattern) for the main task, and (2) a library of modular and reusable design pattern (templates) of subtasks. Thus, it is much easier to build a negotiating agent by assembling these standardised components rather than reinventing the wheel each time. Moreover, since these patterns are identified from a wide variety of existing negotiating agents(especially high impact ones), they can also improve the quality of the final systems developed. In addition, our methodology reveals what types of domain knowledge need to be input into the negotiating agents. This in turn provides a basis for developing techniques to acquire the domain knowledge from human users. This is important because negotiation agents act faithfully on the behalf of their human users and thus the relevant domain knowledge must be acquired from the human users. Finally, our methodology is validated with one high impact system

    Evaluating the Applicability of Socially-Oriented Perspectives to the IT Service Level Agreement Negotiation Process: A Theory-Driven Exploratory Study

    Get PDF
    Continuing exponential growth in the Information Technology (IT) outsourcing market implies a need to understand the negotiated Service Level Agreements (SLAs) that underlie the majority of those sourcing relationships. Knowledge of the negotiation processes that are associated with the development of IT SLAs is a necessary precondition for designing and developing Negotiation Support Systems (NSSs) intended to support those processes. To gain such knowledge, it is first necessary to identify theoretical perspectives that may be relevant to the IT SLA negotiation process, postulate reasonable propositions therefrom, and then evaluate those propositions in a practical, exploratory fashion. Accordingly, the current paper draws on socially-oriented perspectives to develop theory-driven propositions which are then evaluated in an experimental setting. The results of this study indicate that several socially-oriented theories may be relevant to the IT SLA negotiation process, and represent a starting point for the identification of context-specific IT SLA negotiation support systems

    Network strategies for the new economy

    Get PDF
    In this paper we argue that the pace and scale of development in the information and communication technology industries (ICT) has had and continues to have major effects on the industry economics and competitive dynamics generally. We maintain that the size of changes in demand and supply conditions is forcing companies to make significant changes in the way they conceive and implement their strategies. We decompose the ICT industries into four levels, technology standards, supply chains, physical platforms, and consumer networks. The nature of these technologies and their cost characteristics coupled with higher degrees of knowledge specialisation is impelling companies to radical revisions of their attitudes towards cooperation and co-evolution with suppliers and customers. Where interdependencies between customers are particularly strong, we anticipate the possibility of winner-takes-all strategies. In these circumstances industry risks become very high and there will be significant consequences for competitive markets

    Auctions Versus Negotiations in Procurement: An Empirical Analysis

    Get PDF
    Should the buyer of a customized good use competitive bidding or negotiation to select a contractor? To shed light on this question, we offer a framework that compares auctions with negotiations. We then examine a comprehensive data set of private sector building contracts awarded in Northern California during the years 1995-2000. The analysis suggests a number of potential limitations to the use of auctions. Auctions perform poorly when projects are complex, contractual design is incomplete and there are few available bidders. Furthermore, auctions stifle communication between buyers and the sellers, preventing the buyer from utilizing the contractor's expertise when designing the project. Some implications of these results for procurement in the public sector are discussed.

    Automated Negotiation for Provisioning Virtual Private Networks Using FIPA-Compliant Agents

    No full text
    This paper describes the design and implementation of negotiating agents for the task of provisioning virtual private networks. The agents and their interactions comply with the FIPA specification and they are implemented using the FIPA-OS agent framework. Particular attention is focused on the design and implementation of the negotiation algorithms

    Using Constraint Programming for the Automatic Detection of Conflicts in Quality Requirements

    Get PDF
    Requirements negotiation is quite an interesting, ongoing research area. Current requirements engineering models usually propose a negotiation process with similar methods and goals. Unfortunately, only a few have partial automatic support. in this paper, we revisit one of the most mature models, Boehm’s Win–Win model. Win–Win is a qualitative, process–oriented model so that it is specially suited to be used at the early stages of requirements engineering, when knowledge about requirements is still vague, but not for quantitative, product–oriented contexts where a more precise, exact knowledge about the requirements is needed. in this paper, we present a proposal to extend and refine Win–Win in order it can be used in product–oriented contexts. The main benefit of our approach is that the same conceptual model for requirements negotiation can be used during all software development process, instead of using different models in different phasesComisión Interministerial de Ciencia y Tecnología TIC 2000–1106–C02–0

    Trusted operational scenarios - Trust building mechanisms and strategies for electronic marketplaces.

    Get PDF
    This document presents and describes the trusted operational scenarios, resulting from the research and work carried out in Seamless project. The report presents identified collaboration habits of small and medium enterprises with low e-skills, trust building mechanisms and issues as main enablers of online business relationships on the electronic marketplace, a questionnaire analysis of the level of trust acceptance and necessity of trust building mechanisms, a proposal for the development of different strategies for the different types of trust mechanisms and recommended actions for the SEAMLESS project or other B2B marketplaces.trust building mechanisms, trust, B2B networks, e-marketplaces
    corecore