{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T05:57:28Z","timestamp":1718344648390},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T00:00:00Z","timestamp":1644278400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T00:00:00Z","timestamp":1644278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N027965\/1"],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1908374"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2022,4]]},"abstract":"Abstract<\/jats:title>We conceptualize a decentralized<\/jats:italic> software application as one constituted from autonomous<\/jats:italic> agents that communicate via asynchronous<\/jats:italic> messaging. Modern software paradigms such as microservices and settings such as the Internet of Things evidence a growing interest in decentralized applications. Constructing a decentralized application involves designing agents as independent local computations that coordinate successfully to realize the application\u2019s requirements. Moreover, a decentralized application is susceptible to faults manifested as message loss, delay, and reordering. We contribute Mandrake<\/jats:italic>, a programming model for decentralized applications that tackles these challenges without relying on infrastructure guarantees. Specifically, we adopt the construct of an information protocol<\/jats:italic> that specifies messaging between agents purely in causal terms and can be correctly enacted by agents in a shared-nothing environment over nothing more than unreliable, unordered transport. Mandrake facilitates (1) implementing protocol-compliant agents by introducing a programming model; (2) transforming protocols into fault-tolerant ones with simple annotations; and (3) a declarative policy language that makes it easy to implement fault-tolerance in agents based on the capabilities in protocols. Mandrake\u2019s significance lies in demonstrating a straightforward approach for constructing decentralized applications without relying on coordination mechanisms in the infrastructure, thus achieving some of the goals of the founders of networked computing from the 1970s.<\/jats:p>","DOI":"10.1007\/s10458-021-09540-8","type":"journal-article","created":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T08:03:47Z","timestamp":1644307427000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Mandrake: multiagent systems as a basis for programming fault-tolerant decentralized applications"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1341-0087","authenticated-orcid":false,"suffix":"V","given":"Samuel H.","family":"Christie","sequence":"first","affiliation":[]},{"given":"Amit K.","family":"Chopra","sequence":"additional","affiliation":[]},{"given":"Munindar P.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,8]]},"reference":[{"key":"9540_CR1","unstructured":"AMQP (2014). Advanced {Message} {Queuing} {Protocol}. https:\/\/www.amqp.org."},{"issue":"9","key":"9540_CR2","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/83880.84528","volume":"33","author":"G Agha","year":"1990","unstructured":"Agha, G. (1990). Concurrent object-oriented programming. Communications of the ACM (CACM), 33(9), 125\u2013141. https:\/\/doi.org\/10.1145\/83880.84528","journal-title":"Communications of the ACM (CACM)"},{"key":"9540_CR3","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1086.001.0001","volume-title":"Actors","author":"GA Agha","year":"1986","unstructured":"Agha, G. A. (1986). Actors. Cambridge, Massachusetts: MIT Press."},{"issue":"5","key":"9540_CR4","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/303297.303301","volume":"28","author":"M Allman","year":"1998","unstructured":"Allman, M. (1998). On the generation and use of TCP acknowledgments. ACM SIGCOMM Computer Communication Review, 28(5), 4\u201321.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"9540_CR5","unstructured":"Armstrong, J. (2003). Making reliable distributed systems in the presence of software errors. Ph.D. thesis, Royal Institute of Technology, Stockholm, Sweden."},{"issue":"1","key":"9540_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J. C., Randell, B., & Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1), 11\u201333.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"3","key":"9540_CR7","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/s10458-018-9382-3","volume":"32","author":"M Baldoni","year":"2018","unstructured":"Baldoni, M., Baroglio, C., Capuzzimati, F., & Micalizio, R. (2018). Type checking for protocol role enactments via commitments. Autonomous Agents and Multi-Agent Systems, 32(3), 349\u2013386.","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"9540_CR8","doi-asserted-by":"publisher","unstructured":"Baldoni, M., Baroglio, C., Chopra, A.K., Desai, N., Patti, V., & Singh, M.P. (2009). Choice, interoperability, and conformance in interaction protocols and service choreographies. In: Proceedings of the 8th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), pp. 843\u2013850. IFAAMAS, Budapest. https:\/\/doi.org\/10.5555\/1558109.1558129","DOI":"10.5555\/1558109.1558129"},{"key":"9540_CR9","doi-asserted-by":"publisher","unstructured":"Baldoni, M., Baroglio, C., Micalizio, R., & Tedeschi, S. (2020). JADE\/JaCaMo+2COMM: Programming agent interactions. In: Proceedings of the 18th International Conference on Advances in Practical Applications of Agents, Multi-Agent Systems, and Trustworthiness (PAAMS), Lecture Notes in Computer Science, vol. 12092, pp. 388\u2013391. Springer. https:\/\/doi.org\/10.1007\/978-3-030-49778-1_33","DOI":"10.1007\/978-3-030-49778-1_33"},{"key":"9540_CR10","doi-asserted-by":"publisher","unstructured":"Baldoni, M., Boella, G., Genovese, V., Grenna, R., & van\u00a0der Torre, L. (2008). How to program organizations and roles in the JADE framework. In: Proceedings of the 6th German Conference on Multiagent System Technologies, no. 5244 in Lecture Notes in Computer Science, pp. 25\u201336. Springer, Kaiserslautern, Germany. https:\/\/doi.org\/10.1007\/978-3-540-87805-6_4","DOI":"10.1007\/978-3-540-87805-6_4"},{"key":"9540_CR11","doi-asserted-by":"crossref","unstructured":"Birman, K. (2015). Evolution of fault tolerance. In: SOSP History Day, pp. 7:1\u20137:32. ACM, New York.","DOI":"10.1145\/2830903.2830908"},{"issue":"1","key":"9540_CR12","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/164853.164858","volume":"28","author":"KP Birman","year":"1994","unstructured":"Birman, K. P. (1994). A response to Cheriton and Skeen\u2019s criticism of causal and totally ordered communication. Operating Systems Review, 28(1), 11\u201321. https:\/\/doi.org\/10.1145\/164853.164858","journal-title":"Operating Systems Review"},{"issue":"3","key":"9540_CR13","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1145\/128738.128742","volume":"9","author":"KP Birman","year":"1991","unstructured":"Birman, K. P., Schiper, A., & Stephenson, P. (1991). Lightweight causal and atomic group multicast. ACM Transactions on Computer Systems, 9(3), 272\u2013314. https:\/\/doi.org\/10.1145\/128738.128742","journal-title":"ACM Transactions on Computer Systems"},{"key":"9540_CR14","unstructured":"BitTorrent: uTorrent Transport Protocol (2017). http:\/\/bittorrent.org\/beps\/bep_0029.html"},{"key":"9540_CR15","doi-asserted-by":"publisher","first-page":"e2","DOI":"10.1017\/S026988891800005X","volume":"34","author":"O Boissier","year":"2019","unstructured":"Boissier, O., Bordini, R. H., H\u00fcbner, J. F., & Ricci, A. (2019). Dimensions in programming multi-agent systems. Knowledge Engineering Review (KER), 34, e2. https:\/\/doi.org\/10.1017\/S026988891800005X","journal-title":"Knowledge Engineering Review (KER)"},{"key":"9540_CR16","doi-asserted-by":"publisher","unstructured":"Bordini, R.H., & H\u00fcbner, J.F. (2010). Semantics for the Jason variant of AgentSpeak (plan failure and some internal actions). In: Proceedings of the 19th European Conference on Artificial Intelligence (ECAI), Frontiers in Artificial Intelligence and Applications, vol. 215, pp. 635\u2013640. IOS Press, Lisbon. https:\/\/doi.org\/10.3233\/978-1-60750-606-5-635","DOI":"10.3233\/978-1-60750-606-5-635"},{"key":"9540_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71956-4","volume-title":"Programming multi-agent systems in agent speak using Jason","author":"RH Bordini","year":"2007","unstructured":"Bordini, R. H., H\u00fcbner, J. F., & Wooldridge, M. J. (2007). Programming multi-agent systems in agent speak using Jason. Chichester: Wiley."},{"key":"9540_CR18","volume-title":"Designing for scalability with Erlang\/OTP: implement robust, fault-tolerant systems","author":"F Cesarini","year":"2016","unstructured":"Cesarini, F., & Vinoski, S. (2016). Designing for scalability with Erlang\/OTP: implement robust, fault-tolerant systems. UK: O\u2019Reilly Media Inc."},{"key":"9540_CR19","doi-asserted-by":"publisher","unstructured":"Cheriton, D.R., & Skeen, D. (1993). Understanding the limitations of causally and totally ordered communication. In: Proceedings of the 14th ACM Symposium on Operating System Principles (SOSP), pp. 44\u201357. ACM Press, Asheville, North Carolina. https:\/\/doi.org\/10.1145\/168619.168623","DOI":"10.1145\/168619.168623"},{"key":"9540_CR20","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1613\/jair.1.12212","volume":"69","author":"AK Chopra","year":"2020","unstructured":"Chopra, A. K., Christie, S. H., & Singh, M. P. (2020). An evaluation of communication protocol languages for engineering multiagent systems. Journal of Artificial Intelligence Research (JAIR), 69, 1351\u20131393. https:\/\/doi.org\/10.1613\/jair.1.12212.","journal-title":"Journal of Artificial Intelligence Research (JAIR)"},{"key":"9540_CR21","doi-asserted-by":"publisher","unstructured":"Chopra, A.K., & Singh, M.P. (2016). From social machines to social protocols: Software engineering foundations for sociotechnical systems. In: Proceedings of the 25th International World Wide Web Conference, pp. 903\u2013914. ACM, Montr\u00e9al. https:\/\/doi.org\/10.1145\/2872427.2883018","DOI":"10.1145\/2872427.2883018"},{"key":"9540_CR22","doi-asserted-by":"crossref","unstructured":"Christie, S.H., & Chopra, A.K. (2020). Fault tolerance in multiagent systems. In: International Workshop on Engineering Multi-Agent Systems, pp. 78\u201386. Springer.","DOI":"10.1007\/978-3-030-66534-0_5"},{"issue":"5","key":"9540_CR23","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MC.2021.3052147","volume":"54","author":"SH Christie","year":"2021","unstructured":"Christie, S. H., Chopra, A. K. V., & Bungie, M. P. (2021). Bungie: Improving fault tolerance via extensible application-level protocols. IEEE Computer, 54(5), 44\u201353.","journal-title":"IEEE Computer"},{"issue":"12","key":"9540_CR24","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MC.2020.3023887","volume":"53","author":"SH Christie","year":"2020","unstructured":"Christie, S. H., Smirnova, D., Chopra, A. K., & Singh, M. P. (2020). Protocols over things: A decentralized programming model for the Internet of Things. IEEE Computer, 53(12), 60\u201368.","journal-title":"IEEE Computer"},{"key":"9540_CR25","doi-asserted-by":"publisher","unstructured":"Ciortea, A., Boissier, O., Zimmermann, A., & Florea, A.M. (2016). Responsive decentralized composition of service mashups for the internet of things. In: Proceedings of the 6th International Conference on the Internet of Things (IoT), pp. 53\u201361. ACM, Stuttgart. https:\/\/doi.org\/10.1145\/2991561.2991573","DOI":"10.1145\/2991561.2991573"},{"key":"9540_CR26","doi-asserted-by":"publisher","unstructured":"Clark, D. (2015). The network and the OS. In: SOSP History Day, pp. 11:1\u201311:19. ACM, Monterey, California. https:\/\/doi.org\/10.1145\/2830903.2830912","DOI":"10.1145\/2830903.2830912"},{"key":"9540_CR27","doi-asserted-by":"crossref","unstructured":"Curry, E., Chambers, D., & Lyons, G. (2003). A JMS message transport protocol for the JADE platform. In: IEEE\/WIC International Conference on Intelligent Agent Technology, 2003., pp. 596\u2013600. IEEE.","DOI":"10.1109\/IAT.2003.1241153"},{"key":"9540_CR28","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888918000267","volume":"33","author":"M Dastani","year":"2018","unstructured":"Dastani, M., Torroni, P., & Yorke-Smith, N. (2018). Monitoring norms: A multi-disciplinary perspective. Knowledge Engineering Review, 33, e25. https:\/\/doi.org\/10.1017\/S0269888918000267","journal-title":"Knowledge Engineering Review"},{"key":"9540_CR29","unstructured":"de Graauw, M. (2010). Nobody needs reliable messaging. https:\/\/www.infoq.com\/articles\/no-reliable-messaging\/"},{"key":"9540_CR30","doi-asserted-by":"publisher","unstructured":"Ferrando, A., Winikoff, M., Cranefield, S., Dignum, F., & Mascardi, V. (2019). On enactability of agent interaction protocols: Towards a unified approach. In: Proceedings of the 7th International Workshop on Engineering Multi-Agent Systems (EMAS), Lecture Notes in Computer Science, vol. 12058, pp. 43\u201364. Springer, Montr\u00e9al. https:\/\/doi.org\/10.1007\/978-3-030-51417-4_3","DOI":"10.1007\/978-3-030-51417-4_3"},{"issue":"1","key":"9540_CR31","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/s10458-020-09487-2","volume":"35","author":"M Fisher","year":"2021","unstructured":"Fisher, M., Mascardi, V., Rozier, K. Y., Schlingloff, B., Winikoff, M., & Yorke-Smith, N. (2021). Towards a framework for certification of reliable autonomous systems. AAMAS, 35(1), 8. https:\/\/doi.org\/10.1007\/s10458-020-09487-2","journal-title":"AAMAS"},{"key":"9540_CR32","doi-asserted-by":"crossref","unstructured":"Gregori, M.E., C\u00e1mara, J.P., & Bada, G.A. (2006). A jabber-based multi-agent system platform. In: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, pp. 1282\u20131284","DOI":"10.1145\/1160633.1160866"},{"key":"9540_CR33","unstructured":"G\u00fcnay, A., Winikoff, M., & Yolum, P. (2013). Generating and ranking commitment protocols. In: Proceedings of the 12th International Conference on Autonomous Agents and Multiagent Systems, pp. 1323\u20131324. IFAAMAS."},{"key":"9540_CR34","unstructured":"Istio: What is Istio? (2020). https:\/\/istio.io\/latest\/docs\/concepts\/what-is-istio\/"},{"key":"9540_CR35","doi-asserted-by":"crossref","unstructured":"Iyengar, J., & Thomson, M. (2020). QUIC: A UDP-based multiplexed and secure transport. Tech. rep., Internet Engineering Task Force (IETF), Fremont, California. Proposed standard; https:\/\/datatracker.ietf.org\/doc\/draft-ietf-quic-transport\/","DOI":"10.17487\/RFC9000"},{"key":"9540_CR36","unstructured":"Kagermann, H., Wahlster, W., & Helbig, J. (2013). Recommendations for implementing the strategic initiative INDUSTRIE 4.0: Securing the future of German manufacturing industry."},{"key":"9540_CR37","doi-asserted-by":"publisher","unstructured":"Klein, M., & Dellarocas, C. (1999). Exception handling in agent systems. In: Proceedings of the 3rd International Conference on Autonomous Agents, pp. 62\u201368. ACM, Seattle. https:\/\/doi.org\/10.1145\/301136.301164","DOI":"10.1145\/301136.301164"},{"issue":"3","key":"9540_CR38","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s10458-010-9164-z","volume":"23","author":"Y Kubera","year":"2011","unstructured":"Kubera, Y., Mathieu, P., & Picault, S. (2011). IODA: An interaction-oriented approach for multi-agent based simulations. Autonomous Agents and Multi-Agent Systems, 23(3), 303\u2013343.","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"9540_CR39","doi-asserted-by":"crossref","unstructured":"Lam, J., Guerin, F., Vasconcelos, W., & Norman, T.J. (2009). Building multi-agent systems for workflow enactment and exception handling. In: International Workshop on Coordination, Organizations, Institutions, and Norms in Agent Systems, pp. 53\u201369. Springer","DOI":"10.1007\/978-3-642-14962-7_4"},{"issue":"7","key":"9540_CR40","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"L Lamport","year":"1978","unstructured":"Lamport, L. (1978). Time, clocks, and the ordering of events in a distributed system. Communications of the ACM (CACM), 21(7), 558\u2013565. https:\/\/doi.org\/10.1145\/359545.359563","journal-title":"Communications of the ACM (CACM)"},{"key":"9540_CR41","volume-title":"Microservice architecture: aligning principles, practices, and culture","author":"I Nadareishvili","year":"2016","unstructured":"Nadareishvili, I., Mitra, R., McLarty, M., & Amundsen, M. (2016). Microservice architecture: aligning principles, practices, and culture. UK: O\u2019Reilly Media Inc."},{"key":"9540_CR42","unstructured":"OMG: Business Process Model and Notation (BPMN), version 2.0.2 (2014). https:\/\/www.omg.org\/spec\/BPMN\/. Object Management Group"},{"issue":"04","key":"9540_CR43","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MIC.2020.2979161","volume":"24","author":"F Pallas","year":"2020","unstructured":"Pallas, F., Raschke, P., & Bermbach, D. (2020). Fog computing as privacy enabler. IEEE Internet Computing, 24(04), 15\u201321.","journal-title":"IEEE Internet Computing"},{"key":"9540_CR44","doi-asserted-by":"crossref","unstructured":"Platon, E., et\u00a0al. (2007). Modeling exception management in multi-agent systems. Ph.D. thesis, UNIVERSIT\u00c9 PARIS 6.","DOI":"10.1007\/978-3-540-73131-3_3"},{"key":"9540_CR45","unstructured":"Ricci, A., Ciortea, A., Mayer, S., Boissier, O., Bordini, R.H., & H\u00fcbner, J.F. (2019). Engineering scalable distributed environments and organizations for MAS. In: Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), pp. 790\u2013798. IFAAMAS, Montr\u00e9al"},{"key":"9540_CR46","doi-asserted-by":"publisher","unstructured":"Ricci, A., Croatti, A., Bordini, R.H., H\u00fcbner, J.F., & Boissier, O. (2020). Exploiting simulation for MAS development and execution - the JaCaMo-Sim approach. In: Proceedings of the 8th International Workshop on Engineering Multi-Agent Systems (EMAS), Lecture Notes in Computer Science, vol. 12589, pp. 42\u201360. Springer, Auckland. https:\/\/doi.org\/10.1007\/978-3-030-66534-0_3","DOI":"10.1007\/978-3-030-66534-0_3"},{"issue":"4","key":"9540_CR47","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1145\/357401.357402","volume":"2","author":"JH Saltzer","year":"1984","unstructured":"Saltzer, J. H., Reed, D. P., & Clark, D. D. (1984). End-to-end arguments in system design. ACM Transactions on Computer Systems, 2(4), 277\u2013288. https:\/\/doi.org\/10.1145\/357401.357402","journal-title":"ACM Transactions on Computer Systems"},{"issue":"1","key":"9540_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1300000014","volume":"3","author":"D Shah","year":"2009","unstructured":"Shah, D. (2009). Gossip algorithms. Founding in Trends Network, 3(1), 1\u2013125. https:\/\/doi.org\/10.1561\/1300000014","journal-title":"Founding in Trends Network"},{"key":"9540_CR49","doi-asserted-by":"crossref","unstructured":"Shalunov, S., Hazel, G., Iyengar, J., & Kuehlewind, M. (2012). RFC 6817: Low extra delay background transport (LEDBAT). https:\/\/datatracker.ietf.org\/doc\/html\/rfc6817","DOI":"10.17487\/rfc6817"},{"key":"9540_CR50","doi-asserted-by":"crossref","unstructured":"Shelby, Z., Hartke, K., & Bormann, C. (2014). The Constrained Application Protocol (CoAP). Tech. Rep. RFC 7252, Internet Engineering Task Force (IETF), Fremont, California. Proposed standard; https:\/\/tools.ietf.org\/html\/rfc7252","DOI":"10.17487\/rfc7252"},{"key":"9540_CR51","doi-asserted-by":"publisher","unstructured":"de\u00a0Silva, L., Meneguzzi, F., & Logan, B. (2020). BDI agent architectures: A survey. In: Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, IJCAI 2020, pp. 4914\u20134921. ijcai.org. https:\/\/doi.org\/10.24963\/ijcai.2020\/684","DOI":"10.24963\/ijcai.2020\/684"},{"key":"9540_CR52","doi-asserted-by":"publisher","unstructured":"Singh, M.P. (2011). Information-driven interaction-oriented programming: BSPL, the Blindingly Simple Protocol Language. In: Proceedings of the 10th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), pp. 491\u2013498. IFAAMAS, Taipei. https:\/\/doi.org\/10.5555\/2031678.2031687","DOI":"10.5555\/2031678.2031687"},{"key":"9540_CR53","doi-asserted-by":"publisher","unstructured":"Singh, M.P. (2012). Semantics and verification of information-based protocols. In: Proceedings of the 11th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), pp. 1149\u20131156. IFAAMAS, Valencia, Spain. https:\/\/doi.org\/10.5555\/2343776.2343861","DOI":"10.5555\/2343776.2343861"},{"key":"9540_CR54","doi-asserted-by":"publisher","unstructured":"Singh, M.P., & Chopra, A.K. (2017). The Internet of Things and multiagent systems: Decentralized intelligence in distributed computing. In: Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 1738\u20131747. IEEE, Atlanta. https:\/\/doi.org\/10.1109\/ICDCS.2017.304. Blue Sky Thinking Track.","DOI":"10.1109\/ICDCS.2017.304"},{"key":"9540_CR55","doi-asserted-by":"publisher","unstructured":"Singh, M.P., & Christie V, S.H. (2021). Tango: Declarative semantics for multiagent communication protocols. In: Proceedings of the 30th International Joint Conference on Artificial Intelligence (IJCAI), pp. 391\u2013397. IJCAI, Online. https:\/\/doi.org\/10.24963\/ijcai.2021\/55","DOI":"10.24963\/ijcai.2021\/55"},{"key":"9540_CR56","doi-asserted-by":"crossref","unstructured":"Winikoff, M. (2007). Implementing commitment-based interactions. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and MultiAgent Systems (AAMAS), pp. 868\u2013875. IFAAMAS, Honolulu.","DOI":"10.1145\/1329125.1329283"},{"issue":"1","key":"9540_CR57","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10458-017-9373-9","volume":"32","author":"M Winikoff","year":"2018","unstructured":"Winikoff, M., Yadav, N., & Padgham, L. (2018). A new hierarchical agent protocol notation. Journal of Autonomous Agents and Multi-Agent Systems (JAAMAS), 32(1), 59\u2013133.","journal-title":"Journal of Autonomous Agents and Multi-Agent Systems (JAAMAS)"},{"key":"9540_CR58","doi-asserted-by":"crossref","unstructured":"Yolum, P., & Singh, M.P. (2002). Commitment machines. In: Proceedings of the 8th International Workshop on Agent Theories, Architectures, and Languages (ATAL 2001), LNAI, vol. 2333, pp. 235\u2013247. Springer, Seattle.","DOI":"10.1007\/3-540-45448-9_17"}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-021-09540-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10458-021-09540-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-021-09540-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T17:41:26Z","timestamp":1651167686000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10458-021-09540-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,8]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["9540"],"URL":"https:\/\/doi.org\/10.1007\/s10458-021-09540-8","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"value":"1387-2532","type":"print"},{"value":"1573-7454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,8]]},"assertion":[{"value":"14 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"16"}}