866 research outputs found
Representing Conversations for Scalable Overhearing
Open distributed multi-agent systems are gaining interest in the academic
community and in industry. In such open settings, agents are often coordinated
using standardized agent conversation protocols. The representation of such
protocols (for analysis, validation, monitoring, etc) is an important aspect of
multi-agent applications. Recently, Petri nets have been shown to be an
interesting approach to such representation, and radically different approaches
using Petri nets have been proposed. However, their relative strengths and
weaknesses have not been examined. Moreover, their scalability and suitability
for different tasks have not been addressed. This paper addresses both these
challenges. First, we analyze existing Petri net representations in terms of
their scalability and appropriateness for overhearing, an important task in
monitoring open multi-agent systems. Then, building on the insights gained, we
introduce a novel representation using Colored Petri nets that explicitly
represent legal joint conversation states and messages. This representation
approach offers significant improvements in scalability and is particularly
suitable for overhearing. Furthermore, we show that this new representation
offers a comprehensive coverage of all conversation features of FIPA
conversation standards. We also present a procedure for transforming AUML
conversation protocol diagrams (a standard human-readable representation), to
our Colored Petri net representation
TRAMMAS: Enhancing Communication in Multiagent Systems
Tesis por compendio[EN] Over the last years, multiagent systems have been proven to be a powerful and versatile paradigm, with a big
potential when it comes to solving complex problems in dynamic and distributed environments, due to their flexible
and adaptive behavior. This potential does not only come from the individual features of agents (such as autonomy,
reactivity or reasoning power), but also to their capability to communicate, cooperate and coordinate in order to
fulfill their goals. In fact, it is this social behavior what makes multiagent systems so powerful, much more than the
individual capabilities of agents.
The social behavior of multiagent systems is usually developed by means of high
level abstractions, protocols and languages, which normally rely on (or at least, benefit from) agents being able to
communicate and interact indirectly. However, in the development process, such high level concepts habitually
become weakly supported, with mechanisms such as traditional messaging, massive broadcasting, blackboard
systems or ad hoc solutions. This lack of an appropriate way to support indirect communication in actual multiagent
systems compromises their potential.
This PhD thesis proposes the use of event tracing as a flexible, effective and efficient support for indirect interaction
and communication in multiagent systems. The main contribution of this thesis is TRAMMAS, a generic, abstract
model for event tracing support in multiagent systems. The model allows all entities in the system to share their
information as trace events, so that any other entity which require this information is able to receive it. Along with
the model, the thesis also presents an abstract architecture, which redefines the model in terms of a set of tracing
facilities that can be then easily incorporated to an actual multiagent platform. This architecture follows a
service-oriented approach, so that the tracing facilities are provided in the same way than other traditional services
offered by the platform. In this way, event tracing can be considered as an additional information provider for
entities in the multiagent system, and as such, it can be integrated from the earliest stages of the development
process.[ES] A lo largo de los últimos años, los sistemas multiagente han demostrado ser un paradigma potente y versátil,
con un gran potencial a la hora de resolver problemas complejos en entornos dinámicos y distribuidos, gracias a
su comportamiento flexible y adaptativo. Este potencial no es debido únicamente a las características individuales
de los agentes (como son su autonomía, y su capacidades de reacción y de razonamiento), sino que también se
debe a su capacidad de comunicación y cooperación a la hora de conseguir sus objetivos. De hecho, por encima
de la capacidad individual de los agentes, es este comportamiento social el que dota de potencial a los sistemas
multiagente.
El comportamiento social de los sistemas multiagente suele desarrollarse empleando abstracciones, protocolos y
lenguajes de alto nivel, los cuales, a su vez, se basan normalmente en la capacidad para comunicarse e
interactuar de manera indirecta de los agentes (o como mínimo, se benefician en gran medida de dicha
capacidad). Sin embargo, en el proceso de desarrollo software, estos conceptos de alto nivel son soportados
habitualmente de manera débil, mediante mecanismos como la mensajería tradicional, la difusión masiva, o el uso
de pizarras, o mediante soluciones totalmente ad hoc. Esta carencia de un soporte genérico y apropiado para la
comunicación indirecta en los sistemas multiagente reales compromete su potencial.
Esta tesis doctoral propone el uso del trazado de eventos como un soporte flexible, efectivo y eficiente para la
comunicación indirecta en sistemas multiagente. La principal contribución de esta tesis es TRAMMAS, un modelo
genérico y abstracto para dar soporte al trazado de eventos en sistemas multiagente. El modelo permite a
cualquier entidad del sistema compartir su información en forma de eventos de traza, de tal manera que cualquier
otra entidad que requiera esta información sea capaz de recibirla. Junto con el modelo, la tesis también presenta
una arquitectura {abs}{trac}{ta}, que redefine el modelo como un conjunto de funcionalidades que pueden ser
fácilmente incorporadas a una plataforma multiagente real. Esta arquitectura sigue un enfoque orientado a
servicios, de modo que las funcionalidades de traza son ofrecidas por parte de la plataforma de manera similar a
los servicios tradicionales. De esta forma, el trazado de eventos puede ser considerado como una fuente adicional
de información para las entidades del sistema multiagente y, como tal, puede integrarse en el proceso de
desarrollo software desde sus primeras etapas.[CA] Al llarg dels últims anys, els sistemes multiagent han demostrat ser un paradigma potent i versàtil, amb un gran
potencial a l'hora de resoldre problemes complexes a entorns dinàmics i distribuïts, gràcies al seu comportament
flexible i adaptatiu. Aquest potencial no és només degut a les característiques individuals dels agents (com són la
seua autonomia, i les capacitats de reacció i raonament), sinó també a la seua capacitat de comunicació i
cooperació a l'hora d'aconseguir els seus objectius. De fet, per damunt de la capacitat individual dels agents, es
aquest comportament social el que dóna potencial als sistemes multiagent.
El comportament social dels sistemes multiagent solen desenvolupar-se utilitzant abstraccions, protocols i
llenguatges d'alt nivell, els quals, al seu torn, es basen normalment a la capacitat dels agents de comunicar-se i
interactuar de manera indirecta (o com a mínim, es beneficien en gran mesura d'aquesta capacitat). Tanmateix, al
procés de desenvolupament software, aquests conceptes d'alt nivell son suportats habitualment d'una manera
dèbil, mitjançant mecanismes com la missatgeria tradicional, la difusió massiva o l'ús de pissarres, o mitjançant
solucions totalment ad hoc. Aquesta carència d'un suport genèric i apropiat per a la comunicació indirecta als
sistemes multiagent reals compromet el seu potencial.
Aquesta tesi doctoral proposa l'ús del traçat d'esdeveniments com un suport flexible, efectiu i eficient per a la
comunicació indirecta a sistemes multiagent. La principal contribució d'aquesta tesi és TRAMMAS, un model
genèric i abstracte per a donar suport al traçat d'esdeveniments a sistemes multiagent. El model permet a
qualsevol entitat del sistema compartir la seua informació amb la forma d'esdeveniments de traça, de tal forma que
qualsevol altra entitat que necessite aquesta informació siga capaç de rebre-la. Junt amb el model, la tesi també
presenta una arquitectura abstracta, que redefineix el model com un conjunt de funcionalitats que poden ser
fàcilment incorporades a una plataforma multiagent real. Aquesta arquitectura segueix un enfoc orientat a serveis,
de manera que les funcionalitats de traça són oferides per part de la plataforma de manera similar als serveis
tradicionals. D'aquesta manera, el traçat d'esdeveniments pot ser considerat com una font addicional d'informació
per a les entitats del sistema multiagent, i com a tal, pot integrar-se al procés de desenvolupament software des de
les seues primeres etapes.Búrdalo Rapa, LA. (2016). TRAMMAS: Enhancing Communication in Multiagent Systems [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/61765TESISCompendi
Why Good Consumers Love Bad Brands: Assertive Language Makes Consumers Care for Brands
Thesis (Ph.D.) - Indiana University, Kelley School of Business, 2015In social media settings, many firms issue commands to consumers—to post, share or like content—often using forceful and direct (vs. polite) language. However, prior research has shown that commands issued with assertive language elicit negative responses and reactance and also reduce the probability of compliance (Brown and Levinson 1987; Dillard and Shen 2005; Kellerman and Shea 1996; Quick and Considine 2008). In the present research, I show that brands benefit from using assertive language, specifically in the form of increased care and concern from consumers. This is because assertive language communicates an intention to control, and intentionality is one indication of a humanlike mind (Epley and Waytz 2009; Kozak Marsh, and Wenger 2006; Waytz et al. 2010b). Five experiments demonstrate the relationship between assertive language, mind attribution, and care and concern for the brand. Both statistical and experimental evidence of the mediating role of mind attribution are presented. Finally, a boundary effect of this relationship is also explored by examining the role of mind valence, which decouples the link between mind attribution and brand care and concern when a threatening or malevolent mind is attributed to a brand. Thus, this research contributes to the brand anthropomorphism literature by showing that mind attribution, which not only suggests the brand is humanlike but the specific manner in which it is humanlike, can be elicited with subtle linguistic cues and has beneficial effects for the brand. This work is unique in showing a benefit to assertive language. It also offers insights to the mind perception and brand relationship literatures. Finally this work is managerially useful as assertive language can be readily implemented by firms and fits with a wide variety of brand traits and associations. Additionally the outcome of brand care and concern is beneficial to firms
Prophetic Imagination in the Light of Narratology and Disability Studies in Isaiah 40–48
Analyzes Isaiah 40–48 as a single literary work through levels of speakers (frame and subordinate) with implications for its construction of divine potency and communication
The improvements of power management for clustered type large scope wireless sensor networks2010
Fuente Aragón, PDL. (2010). The improvements of power management for clustered type large scope wireless sensor networks2010. http://hdl.handle.net/10251/10244.Archivo delegad
Rendering Verbal Irony of “One Flew over the Cuckoo’s Nest”: Novel, Cinematic Adaptation and Lithuanian Subtitles
This article analyses the transformation of verbal irony within literary works during adaptation and subtitle translation processes. During the process of adaptation, verbal irony is often altered or lost. In the realms of Lithuanian cinema, subtitling is a common mode of presentation, necessitating additional adjustments to accommodate translation constraints. The study is structured into theoretical and empirical parts. Firstly, it delves into irony typology, characteristics, adaptation strategies, and subtitling approaches. Then, it employs a comparative methodology to analyse verbal irony in Ken Kesey's novel "One Flew Over the Cuckoo's Nest" (1962), its cinematic adaptation by Miloš Forman (1975), and the Lithuanian subtitle translation by Narius Kairys (2018). This method unveils how verbal irony can change or persist during adaptation and subtitling processes. The examples analysed illustrate that the verbal irony from the novel may be lost or simplified and shortened in the adaptation, but it may also be complemented by non-verbal elements, such as acting and intonation. This research revealed that the film contains new cases of verbal irony absent from the original literary work. Notably, the verbal irony in the subtitles is simplified by using a near-synonym expression, omission or changes in word class and, consequently, loses its original impact.
 
Chat Communication in a Command and Control Environment: How Does It Help?
Military command and control (C2) teams are often faced with difficult, complex, and distributed operations amidst the fog and friction of war. To deal with this uncertainty, teams rely on clear and effective communication to coordinate their actions; two current conduits for communication in distributed military teams include voice and chat. Chat communication is regarded by many in the C2 world as the premier method of communicating with the power to lessen some of the traffic and disturbances of current voice communication, and its usage continues to exponentially increase. Despite this operational view, countless laboratory studies have demonstrated detrimental effects of chat communication relative to voice communication. The current study investigates the gap between laboratory research results and usage in complex environments, and empirically tests the effect that chat communication has on tactical C2 performance through an air battle management synthetic task environment. Results demonstrate that participants performed better on time-critical, emergent events with voice communication and better on preplanned missions when they had access to archival information. Voice communication is a valuable, high bandwidth channel that is essential for coordination in highly complex situations, while chat communication is a nonintrusive form of communication that allows the operator flexibility in prioritizing the information flow through the use of archival information. The challenge in operational settings with overcrowded radio channels, however, is to protect the voice channel to ensure it is available when the situation demands it. With careful implementation, voice and chat communication can be complementary technologies to facilitate complex work
Using Norms To Control Open Multi-Agent Systems
Internet es, tal vez, el avance científico más relevante de nuestros días. Entre
otras cosas, Internet ha permitido la evolución de los paradigmas de computación tradicionales hacia el paradigma de computaciónn distribuida, que se
caracteriza por utilizar una red abierta de ordenadores. Los sistemas multiagente
(SMA) son una tecnolog a adecuada para abordar los retos motivados
por estos sistemas abiertos distribuidos. Los SMA son aplicaciones formadas
por agentes heterog eneos y aut onomos que pueden haber sido dise~nados de
forma independiente de acuerdo con objetivos y motivaciones diferentes. Por
lo tanto, no es posible realizar ninguna hip otesis a priori sobre el comportamiento
de los agentes. Por este motivo, los SMA necesitan de mecanismos
de coordinaci on y cooperaci on, como las normas, para garantizar el orden
social y evitar la aparici on de conictos.
El t ermino norma cubre dos dimensiones diferentes: i) las normas como
un instrumento que gu a a los ciudadanos a la hora de realizar acciones y
actividades, por lo que las normas de nen los procedimientos y/o los protocolos
que se deben seguir en una situaci on concreta, y ii) las normas como
ordenes o prohibiciones respaldadas por un sistema de sanciones, por lo que
las normas son medios para prevenir o castigar ciertas acciones. En el area
de los SMA, las normas se vienen utilizando como una especi caci on formal
de lo que est a permitido, obligado y prohibido dentro de una sociedad. De
este modo, las normas permiten regular la vida de los agentes software y las
interacciones entre ellos.
La motivaci on principal de esta tesis es permitir a los dise~nadores de los
SMA utilizar normas como un mecanismo para controlar y coordinar SMA
abiertos. Nuestro objetivo es elaborar mecanismos normativos a dos niveles:
a nivel de agente y a nivel de infraestructura. Por lo tanto, en esta tesis se
aborda primero el problema de la de nici on de agentes normativos aut onomos
que sean capaces de deliberar acercaCriado Pacheco, N. (2012). Using Norms To Control Open Multi-Agent Systems [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/17800Palanci
Police interviews with women reporting rape: a critical discourse analysis
This study investigates the discursive patterns of interactions between police interviewers and women reporting rape in significant witness interviews. Data in the form of video recorded interviews were obtained from a UK police force for the purposes of this study. The data are analysed using a multi-method approach, incorporating tools from micro-sociology, Conversation Analysis and Discursive Psychology, to reveal patterns of interactional control, negotiation, and interpretation. The study adopts a critical approach, which is to say that as well as describing discursive patterns, it explains them in light of the discourse processes involved in the production and consumption of police interview talk, and comments on the relationship between these discourse processes and the social context in which they occur. A central focus of the study is how interviewers draw on particular interactional resources to shape interviewees? accounts in particular ways, and this is discussed in relation to the institutional role of the significant witness interview. The discussion is also extended to the ways in which mainstream rape ideology is both reflected in, and maintained by, the discursive choices of participants. The findings of this study indicate that there are a number of issues to be addressed in terms of the training currently offered to officers at Level 2 of the Professionalising Investigation Programme (PIP) (NPIA, 2009) who intend to conduct significant witness interviews. Furthermore, a need is identified to bring the linguistic and discursive processes of negotiation and transformation identified by the study to the attention of the justice system as a whole. This is a particularly pressing need in light of judicial reluctance to replace written witness statements, the current „end product? of significant witness interviews, with the video recorded interview in place of direct examination in cases of rape
Digital provenance - models, systems, and applications
Data provenance refers to the history of creation and manipulation of a data object and is being widely used in various application domains including scientific experiments, grid computing, file and storage system, streaming data etc. However, existing provenance systems operate at a single layer of abstraction (workflow/process/OS) at which they record and store provenance whereas the provenance captured from different layers provide the highest benefit when integrated through a unified provenance framework. To build such a framework, a comprehensive provenance model able to represent the provenance of data objects with various semantics and granularity is the first step. In this thesis, we propose a such a comprehensive provenance model and present an abstract schema of the model. ^ We further explore the secure provenance solutions for distributed systems, namely streaming data, wireless sensor networks (WSNs) and virtualized environments. We design a customizable file provenance system with an application to the provenance infrastructure for virtualized environments. The system supports automatic collection and management of file provenance metadata, characterized by our provenance model. Based on the proposed provenance framework, we devise a mechanism for detecting data exfiltration attack in a file system. We then move to the direction of secure provenance communication in streaming environment and propose two secure provenance schemes focusing on WSNs. The basic provenance scheme is extended in order to detect packet dropping adversaries on the data flow path over a period of time. We also consider the issue of attack recovery and present an extensive incident response and prevention system specifically designed for WSNs
- …