The work in this paper is motivated from the need for assumption-based reasoning in normative systems, where, realistically, agents will have incomplete knowledge about their environment, and about other agents. The question we seek to address is whether it is possible for agents to identify appropriate assumptions dynamically, in order to fill in informational gaps. We discuss and illustrate our proposal with reference to an e-commerce example. In our previous work, we argued that e-contracts could be represented as Default Theories and proposed a theoretical way in which such theories could be constructed automatically from initial Event Calculus representations. That proposal relied on determining what information could be proved from the agentpsilas knowledge base, in order to decide whether it would serve as an assumption or not. In this paper we present an incremental technique that can be used for this construction that enables the dynamic and ad hoc identification of candidate assumptions, without resorting to proof.
{"title":"How Can Agents Know What to Assume When?","authors":"G. Giannikis, Aspassia Daskalopulu","doi":"10.1109/WIIAT.2008.166","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.166","url":null,"abstract":"The work in this paper is motivated from the need for assumption-based reasoning in normative systems, where, realistically, agents will have incomplete knowledge about their environment, and about other agents. The question we seek to address is whether it is possible for agents to identify appropriate assumptions dynamically, in order to fill in informational gaps. We discuss and illustrate our proposal with reference to an e-commerce example. In our previous work, we argued that e-contracts could be represented as Default Theories and proposed a theoretical way in which such theories could be constructed automatically from initial Event Calculus representations. That proposal relied on determining what information could be proved from the agentpsilas knowledge base, in order to decide whether it would serve as an assumption or not. In this paper we present an incremental technique that can be used for this construction that enables the dynamic and ad hoc identification of candidate assumptions, without resorting to proof.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122114630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
TD-FALCON (temporal difference-fusion architecture for learning, cognition, and navigation) is a class of self-organizing neural networks that incorporates temporal difference (TD) methods for real-time reinforcement learning. In this paper, we present two strategies, i.e. policy sharing and neighboring-agent mechanism, to further improve the learning efficiency of TD-FALCON in complex multi-agent domains. Through experiments on a traffic control problem domain and the herding task, we demonstrate that those strategies enable TD-FALCON to remain functional and adaptable in complex multi-agent domains.
{"title":"Scaling Up Multi-agent Reinforcement Learning in Complex Domains","authors":"D. Xiao, A. Tan","doi":"10.1109/WIIAT.2008.259","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.259","url":null,"abstract":"TD-FALCON (temporal difference-fusion architecture for learning, cognition, and navigation) is a class of self-organizing neural networks that incorporates temporal difference (TD) methods for real-time reinforcement learning. In this paper, we present two strategies, i.e. policy sharing and neighboring-agent mechanism, to further improve the learning efficiency of TD-FALCON in complex multi-agent domains. Through experiments on a traffic control problem domain and the herding task, we demonstrate that those strategies enable TD-FALCON to remain functional and adaptable in complex multi-agent domains.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129596774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper accentuate an approach of implementing distributed data mining (DDM) using multi-agent system (MAS) technology, and proposes a data mining technique of ldquoCAKErdquo (classifying, associating & knowledge discovery). The architecture is based on centralized parallel data mining agents (PADMAs). Data mining is part of a word, which has been recently introduced known as BI or business intelligence. The need is to derive knowledge out of the abstract data. The process is difficult, complex, time consuming and resource starving. These highlighted problems addressed in the proposed model. The model architecture is distributed, uses knowledge-driven mining technique and flexible enough to work on any data warehouse, which will help to overcome these problems. Good knowledge of data, meta-data and business domain is required for defining rules for data mining. Taking into consideration that the data and data warehouse has already gone through the necessary processes and ready for data mining.
{"title":"CAKE – Classifying, Associating and Knowledge DiscovEry - An Approach for Distributed Data Mining (DDM) Using PArallel Data Mining Agents (PADMAs)","authors":"D. Khan","doi":"10.1109/WIIAT.2008.236","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.236","url":null,"abstract":"This paper accentuate an approach of implementing distributed data mining (DDM) using multi-agent system (MAS) technology, and proposes a data mining technique of ldquoCAKErdquo (classifying, associating & knowledge discovery). The architecture is based on centralized parallel data mining agents (PADMAs). Data mining is part of a word, which has been recently introduced known as BI or business intelligence. The need is to derive knowledge out of the abstract data. The process is difficult, complex, time consuming and resource starving. These highlighted problems addressed in the proposed model. The model architecture is distributed, uses knowledge-driven mining technique and flexible enough to work on any data warehouse, which will help to overcome these problems. Good knowledge of data, meta-data and business domain is required for defining rules for data mining. Taking into consideration that the data and data warehouse has already gone through the necessary processes and ready for data mining.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124656895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The understanding of the micro-macro link is an urgent need in the study of social systems. The complex adaptive nature of social systems adds to the challenges of understanding social interactions and system feedback and presents substantial scope and potential for extending the frontiers of computer-based research tools such as simulations and agent-based technologies. In this project, we seek to understand key research questions concerning the interplay of ethical trust at the individual level and the development of collective social moral norms as representative sample of the bigger micro-macro link of social systems. We outline our computational model of ethical trust (CMET) informed by research findings from trust, machine ethics and neural science. Guided by the CMET architecture, we discuss key implementation ideas for the simulations of ethical trust and social moral norms.
{"title":"Ethical Trust and Social Moral Norms Simulation: A Bio-inspired Agent-Based Modelling Approach","authors":"Hock Chuan Lim, Rob Stocker, Henry Larkin","doi":"10.1109/WIIAT.2008.184","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.184","url":null,"abstract":"The understanding of the micro-macro link is an urgent need in the study of social systems. The complex adaptive nature of social systems adds to the challenges of understanding social interactions and system feedback and presents substantial scope and potential for extending the frontiers of computer-based research tools such as simulations and agent-based technologies. In this project, we seek to understand key research questions concerning the interplay of ethical trust at the individual level and the development of collective social moral norms as representative sample of the bigger micro-macro link of social systems. We outline our computational model of ethical trust (CMET) informed by research findings from trust, machine ethics and neural science. Guided by the CMET architecture, we discuss key implementation ideas for the simulations of ethical trust and social moral norms.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130679433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the age of increasing information availability, many techniques, such as document clustering and information visualization, have been developed to ease understanding of information for users. However, most of these methods do not help users directly understand key concepts and their semantic relationships in document corpora, which are critical for capturing their conceptual structures. Therefore, we propose a novel approach called 'Clonto' to identify the key concepts and automatically generate ontologies based on these concepts for conceptualization of document corpora. Clonto applies latent semantic analysis to identify key concepts, allocates documents based on these concepts, and utilizes WordNet to automatically generate a corpus-related ontology. The documents are linked to the ontology through the key concepts. The experimental results show that Clonto can identify key concepts with a high precision and the clustering results of Clonto outperform the STC (Suffix Tree Clustering) algorithm, the Lingo clustering algorithm, the Fuzzy Ants clustering algorithm, and clustering based on TRS (Tolerance Rough Set). Moreover, based on the same document corpus, the ontology generated by Clonto shows a significant informative conceptual structure.
在信息可用性日益增加的时代,许多技术,如文档聚类和信息可视化,已经被开发出来,以方便用户理解信息。然而,大多数这些方法并不能帮助用户直接理解文档语料库中的关键概念及其语义关系,而这些概念和语义关系对于捕获它们的概念结构至关重要。因此,我们提出了一种名为“Clonto”的新方法来识别关键概念,并基于这些概念自动生成本体,用于文档语料库的概念化。Clonto应用潜在语义分析来识别关键概念,根据这些概念分配文档,并利用WordNet自动生成与语料库相关的本体。文档通过关键概念链接到本体。实验结果表明,Clonto能够以较高的精度识别关键概念,其聚类结果优于STC (Suffix Tree clustering)算法、Lingo聚类算法、Fuzzy Ants聚类算法和基于TRS (Tolerance Rough Set)的聚类。此外,基于相同的文档语料库,Clonto生成的本体显示出显著的信息概念结构。
{"title":"A Concept-Driven Automatic Ontology Generation Approach for Conceptualization of Document Corpora","authors":"Haitao Zheng, Charles Borchert, H. Kim","doi":"10.1109/WIIAT.2008.233","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.233","url":null,"abstract":"In the age of increasing information availability, many techniques, such as document clustering and information visualization, have been developed to ease understanding of information for users. However, most of these methods do not help users directly understand key concepts and their semantic relationships in document corpora, which are critical for capturing their conceptual structures. Therefore, we propose a novel approach called 'Clonto' to identify the key concepts and automatically generate ontologies based on these concepts for conceptualization of document corpora. Clonto applies latent semantic analysis to identify key concepts, allocates documents based on these concepts, and utilizes WordNet to automatically generate a corpus-related ontology. The documents are linked to the ontology through the key concepts. The experimental results show that Clonto can identify key concepts with a high precision and the clustering results of Clonto outperform the STC (Suffix Tree Clustering) algorithm, the Lingo clustering algorithm, the Fuzzy Ants clustering algorithm, and clustering based on TRS (Tolerance Rough Set). Moreover, based on the same document corpus, the ontology generated by Clonto shows a significant informative conceptual structure.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123500680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juana María Ruiz-Martínez, J. A. Miñarro-Giménez, Laura Guillén-Cárceles, D. C. Nieves, R. Valencia-García, Francisco García-Sánchez, J. Fernández-breis, R. Martínez-Béjar
The semantic Web vision is based on structuring the knowledge that is present in the current Web so that it is understandable by machines without human intervention. Ontologies are the backbone technology for the semantic Web. Thus, the realization of the semantic Web vision largely depends on the design and instantiation of ontologies. While several methodologies for designing ontologies and automating ontology learning have been proposed, ontology population has not received much attention so far. This paper presents a methodology for populating ontologies from natural language Web documents. For this, semantic Web technologies and natural language technologies have been used. This approach has been applied in the eTourism domain.
{"title":"Populating Ontologies in the eTourism Domain","authors":"Juana María Ruiz-Martínez, J. A. Miñarro-Giménez, Laura Guillén-Cárceles, D. C. Nieves, R. Valencia-García, Francisco García-Sánchez, J. Fernández-breis, R. Martínez-Béjar","doi":"10.1109/WIIAT.2008.278","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.278","url":null,"abstract":"The semantic Web vision is based on structuring the knowledge that is present in the current Web so that it is understandable by machines without human intervention. Ontologies are the backbone technology for the semantic Web. Thus, the realization of the semantic Web vision largely depends on the design and instantiation of ontologies. While several methodologies for designing ontologies and automating ontology learning have been proposed, ontology population has not received much attention so far. This paper presents a methodology for populating ontologies from natural language Web documents. For this, semantic Web technologies and natural language technologies have been used. This approach has been applied in the eTourism domain.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114232751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Past yearspsila radical changes in how we use the World Wide Web led to new challenges in guarding user rights. The ldquoWeb 2.0rdquo movement relies to large extents on commercial Web services where users can publish their content and manage their personal information. Experience has shown that the companies providing these Web services only then seek for standardized, open, and trustworthy solutions if it is beneficial for them. In order to empower users to take control over their content and their data, existing security models need to be extended to fit the new situation, and new types of services supporting user control need to be developed.
{"title":"Enlightenment 2.0: Facilitating User Control in Distributed Collaborative Applications","authors":"M. Quasthoff","doi":"10.1109/WIIAT.2008.248","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.248","url":null,"abstract":"Past yearspsila radical changes in how we use the World Wide Web led to new challenges in guarding user rights. The ldquoWeb 2.0rdquo movement relies to large extents on commercial Web services where users can publish their content and manage their personal information. Experience has shown that the companies providing these Web services only then seek for standardized, open, and trustworthy solutions if it is beneficial for them. In order to empower users to take control over their content and their data, existing security models need to be extended to fit the new situation, and new types of services supporting user control need to be developed.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114703973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The semantic Web offers new opportunities to integrate desktop applications seamlessly with one another, but most software applications currently still rely on proprietary RDBMS systems for data storage, and application logic is typically expressed only through general-purpose programming languages without being formally defined. In this article we propose an alternative approach to designing simple applications, using an OWL-DL ontology to define ECA rules for a domain and then use a novel software framework to transform these into a functional Java API that can execute these rules according to the ontology specification. We use the simple case of a turn based word-game to illustrate the framework in action. The project methodology and framework design are discussed and suggestions for further work are proposed.
{"title":"A Software Framework for Translating ECA Sequences from OWL-DL into Java","authors":"Will Mepham, S. Gardner","doi":"10.1109/WIIAT.2008.281","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.281","url":null,"abstract":"The semantic Web offers new opportunities to integrate desktop applications seamlessly with one another, but most software applications currently still rely on proprietary RDBMS systems for data storage, and application logic is typically expressed only through general-purpose programming languages without being formally defined. In this article we propose an alternative approach to designing simple applications, using an OWL-DL ontology to define ECA rules for a domain and then use a novel software framework to transform these into a functional Java API that can execute these rules according to the ontology specification. We use the simple case of a turn based word-game to illustrate the framework in action. The project methodology and framework design are discussed and suggestions for further work are proposed.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124325291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Business activity monitoring (BAM) and business intelligence (BI) solutions are both intended to provide insight into the activities and performance of the enterprise. Deployment of such systems requires extensive tailoring to the enterprise, best left to experts. The dynamics of the enterprise demands a solution to the maintenance of BAM/BI solutions. This paper presents an ontology-based BAM-agent, called OBAMA that supports the maintenance of the system in light of changing business processes. Furthermore, for the formulation of aspects and properties to be monitored, it combines the expressive power of SQL, and TTL (a temporal trace language of first order logic). OBAMA helps in the preparation of regular assessment reports on the enterprise, taking into account key performance indicators as set by its operation manager. The paper describes the architecture, the combination of SQL, and TTL techniques for monitoring, and provides description of its kernel processes. OBAMApsilas performance in a surveillance company is presented.
{"title":"Ontology-Based Business Activity Monitoring Agent","authors":"D. Ferro, M. Hoogendoorn, C. Jonker","doi":"10.1109/WIIAT.2008.140","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.140","url":null,"abstract":"Business activity monitoring (BAM) and business intelligence (BI) solutions are both intended to provide insight into the activities and performance of the enterprise. Deployment of such systems requires extensive tailoring to the enterprise, best left to experts. The dynamics of the enterprise demands a solution to the maintenance of BAM/BI solutions. This paper presents an ontology-based BAM-agent, called OBAMA that supports the maintenance of the system in light of changing business processes. Furthermore, for the formulation of aspects and properties to be monitored, it combines the expressive power of SQL, and TTL (a temporal trace language of first order logic). OBAMA helps in the preparation of regular assessment reports on the enterprise, taking into account key performance indicators as set by its operation manager. The paper describes the architecture, the combination of SQL, and TTL techniques for monitoring, and provides description of its kernel processes. OBAMApsilas performance in a surveillance company is presented.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126198194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper investigates how tags can be used to achieve emergence of sharing behavior in a multi-agent society made of different groups. The context of interaction between agents in the society is the knowledge-sharing game, where agents use tags to identify those who are similar to them. This paper explains under what circumstances tags succeed to establish knowledge sharing. The results discussed in this paper were obtained using the simulation of artificial agent societies.
{"title":"Emergence of Sharing Behavior in a Multi-agent Society Using Tags","authors":"S. Savarimuthu, Maryam A. Purvis, M. Purvis","doi":"10.1109/WIIAT.2008.310","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.310","url":null,"abstract":"This paper investigates how tags can be used to achieve emergence of sharing behavior in a multi-agent society made of different groups. The context of interaction between agents in the society is the knowledge-sharing game, where agents use tags to identify those who are similar to them. This paper explains under what circumstances tags succeed to establish knowledge sharing. The results discussed in this paper were obtained using the simulation of artificial agent societies.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128002180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}