<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Enriching Business Artifacts with Coordination</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Matteo</forename><surname>Baldoni</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Dipartimento di Informatica c</orgName>
								<orgName type="institution">Università degli Studi di Torino</orgName>
								<address>
									<addrLine>Svizzera 185</addrLine>
									<postCode>I-10149</postCode>
									<settlement>Torino (</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Cristina</forename><surname>Baroglio</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Dipartimento di Informatica c</orgName>
								<orgName type="institution">Università degli Studi di Torino</orgName>
								<address>
									<addrLine>Svizzera 185</addrLine>
									<postCode>I-10149</postCode>
									<settlement>Torino (</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Federico</forename><surname>Capuzzimati</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Dipartimento di Informatica c</orgName>
								<orgName type="institution">Università degli Studi di Torino</orgName>
								<address>
									<addrLine>Svizzera 185</addrLine>
									<postCode>I-10149</postCode>
									<settlement>Torino (</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Roberto</forename><surname>Micalizio</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Dipartimento di Informatica c</orgName>
								<orgName type="institution">Università degli Studi di Torino</orgName>
								<address>
									<addrLine>Svizzera 185</addrLine>
									<postCode>I-10149</postCode>
									<settlement>Torino (</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Enriching Business Artifacts with Coordination</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">007A1A065C805FEB74744AE6C272F4FB</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T06:10+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Business Artifacts</term>
					<term>Normative MAS</term>
					<term>Social Commitments</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper proposes to enrich the artifact-centric approach in two ways. First, relying on the Agent-Oriented Paradigm (AOP), the tasks acting on artifacts are organized in agents, seen as autonomous loci of control, whose execution is goal-driven. Second, the business artifact model is complemented by a normative dimension. Norms are used to represent the data lifecycle in a form that is inspectable and reasoned upon by agents. Agents can therefore create expectations about the behaviors of others and hence, leveraging on the norms, agents can act on an artifact so as to entice, or oblige, others to act themselves. The paper discusses the advantages and consequences of this norm-aware enrichment, and outlines a possible realization based on social commitments.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">A Normative Approach to Business Artifacts</head><p>The artifact-centric approach <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b7">8]</ref> is recently emerging as a viable solution for specifying and deploying business operations by combining both data and process as firstclass citizens. In particular, the notion of Business Artifact, initially proposed by Nigam and Caswell <ref type="bibr" target="#b10">[11]</ref>, opened the way for the development of a data-driven approach to the modeling of business operations. The data-driven approach counterposes a data-centric vision to the activity-centric vision, traditionally used when workflows are explicitly modeled in terms of processes. Artifacts are concrete, identifiable, self-describing chunks of information, the basic building blocks by which business models and operations are described. They are business-relevant objects that are created and evolve as they pass through business operations. They include an information model of the data, and a lifecycle model, that contains the key states through which the data evolve, together with their transitions (triggered by the execution of corresponding tasks). A change to an artifact can trigger changes to other artifacts, possibly of a different type. The lifecycle model is not only used at runtime to track the evolution of artifacts, but also at design time to understand who is responsible of which transitions. In <ref type="bibr" target="#b5">[6]</ref>, the artifact-centric model is at the basis of the BALSA data-centric declarative model of business operations. The BALSA methodology can be summarized in three steps: 1) identify the relevant business artifacts of the problem at hand and their lifecycles, 2) develop a detailed specification of the services (or tasks) that will cause the evolution of the artifact lifecycles, 3) define a number of ECA-rules (Event-Condition-Action) that create associations between services and artifacts. ECA-rules are the building blocks to define, in a declarative way, processes operating on data. A way to coordinate different processes operating on the same artifacts is by means of choreographies. However, BALSA does not specify how choreographies should be used to coordinate declarative processes.</p><p>Although the BALSA model is extremely interesting and introduces a novel perspective on the modeling of business processes, we deem the absence of an explicit representation of the coordination structure within the model a significant flaw. In particular, in inherently destructured settings, as cross-organizational interactions, the involved actors are all peers, each of which has its own business goals, and acts in an autonomous way. Each actor does not know and does not care about the possible goals of the others. Nevertheless, actors generally need to interact to achieve goals they would not be able to achieve alone. The interaction is a critical dimension that need to be explicitly modeled to coordinate the usage of shared resources. This poses the question of how to scale the business artifact model to coordinate autonomous entities.</p><p>We see in the introduction of a coordination model within business artifacts the way to achieve this goal, and explain what we mean with a simple example. Let us consider a purchase scenario, involving a merchant and a client. We claim that in order to coordinate the interaction between the two agents, it is necessary to add to the plain message exchange (which standard approaches to business processes envisage as the only means of interaction), one further abstraction that explicitly represents the engagements each player has towards the other. We also claim that business artifacts should trace such engagements and their evolution, in order to enable an effective agent coordination. For example, when offering to sell some goods, the merchant commits to the client to ship the items the client will pay for. Such a commitment is stored by the business artifact involved in the interaction between the two. Because of his awareness of such a commitment, the client, having paid for the goods, expects the shipment to occur. If this does not happen, the commitment progresses into a state of "violation" and this information, stored in the business artifact, provides a proof of the merchant's misbehavior. From a different perspective, a client is enticed to use a business artifact by the merchant's commitment, which makes explicit the course of interaction the merchant binds to, and creates a right on the client that such an expected course of action be respected (i.e., my payment will put an obligation on the merchant to ship the bought items or the merchant will violate the commitment). On the other hand, the merchant uses commitments inside the business artifact to entice interactions with potential clients -indeed, the obligation yielded by a commitment is activated only if a client pays for some goods.</p><p>In the example, the commitments that go along with a business artifact make explicit the behavior the agents are expected to stick to. They also have a normative flavour, as diverging behaviors will be considered as violations. This awareness causes agents to take part to an interaction only if they are fine with the commitments. As such, commitments provide a standard to define standards of interaction mediated by business artifacts. To realize this vision, we claim that (1) services should be encapsulated and organized into goal-oriented containers; (2) it is necessary to introduce a normative layer. For what concerns (1), the Agent-Oriented Paradigm (AOP), briefly introduced in Section 2, is a good candidate. In particular, the Agent and Artifact meta-model (A&amp;A) <ref type="bibr" target="#b11">[12]</ref> has already shown how artifacts can be used as environment components that mediate agents' interactions. However, artifacts in the A&amp;A model are radically different from the business artifacts because they do not come with an explicit information model for data, and they do not exhibit data lifecycles. Thus, this information cannot be exploited at design time, nor at runtime, to reason about which actions should be taken towards the achievement of an agent's goals. Concerning (2), the normative layer would provide an explicit representation of the business artifacts lifecycles, and of how coordination is expected to occur. Such a representation would allow agents to reason about the use of business artifacts and to create mutual engagements for driving their activities. Indeed, we envisage engagements as encoding causal relations between the actions of an agent and the goals and actions of another, with a normative power that would allow each agent to have expectations on the behavior of the others. In the purchase example, it is easy to see how the introduction of a norm in form of the commitment whenever a customer pays, the merchant will ship the goods, would enhance coordination.The customer now knows that after service pay, the merchant will be pushed to consider the service ship-goods as one of its next goals, otherwise it will violate the norm and will be sanctioned for that. This provides the customer a guarantee about the achievement of its own goal (or to recoup its losses). An explicit normative layer plays a central role both at the design time, to verify whether all the engagements can converge towards their satisfaction, and at running time to monitor the execution of a system and determine the violation of engagements. In this paper we introduce the notion of normative business artifacts as a means to extend the artifact-centric approach with a normative layer, where engagements and norms are expressed in terms of social commitments <ref type="bibr" target="#b12">[13]</ref>. The introduction of a normative layer in the more general setting of business processes is seen as desirable also in <ref type="bibr" target="#b14">[15]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Coordination via Normative Business Artifacts</head><p>Business artifacts are, by definition, data-aware. They consider data as a first-class primitive that drives the process modeling <ref type="bibr" target="#b4">[5]</ref>. Artifacts, however, are not an end in themselves. They are business relevant entities that are created, accessed, and manipulated by different services along a business process. Business artifacts, however, are also resources on whose use interacting parties coordinate. We now show how to introduce a normative layer that supports such coordination.</p><p>Introducing Goal-oriented Containers. Destructured business processes call for a modularization of the control flow. AOP <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b16">17]</ref> is conceived exactly for handling multiple and concurrent control flows. Two elements are central in AOP: the agents and the environment. Agents, as abstractions of processes, possess their own control flow, summarized as the cyclic process in which an agent observes the environment (updating its beliefs), deliberates which intentions to achieve, plans how to achieve them, and finally executes the plan <ref type="bibr" target="#b6">[7]</ref>. Beliefs concern the environment. Intentions lead to action <ref type="bibr" target="#b16">[17]</ref>, meaning that if an agent has an intention, then the expectation is that it will make a reasonable attempt to achieve it. In this sense, intentions play a central role in the selection and the execution of actions, which represent the innate capabilities agents have to modify their environment. Among others, (business) artifacts (see A&amp;A-meta model <ref type="bibr" target="#b11">[12]</ref>) are privileged elements of an environment. In particular, in contexts where agents cannot achieve their goals on their own, but need to interact with other agents to do so, artifacts provide shared resources that agents will use to mediate their interactions.</p><p>Introducing Norm-awareness. We claim that business artifacts should be norm-aware in two ways. First, the lifecycle of a business artifact should be made explicit by way of norms that specify the rules by which the data evolve. The agents (i.e., the artifact users), will be able to inspect and reason upon them to decide if and how to operate on an artifact to obtain some result. Second, agents need to coordinate and regulate their interaction in using the artifacts to achieve their goals. Given these two bodies of norms, agents will apply reasoning techniques to plan proper coordination that, possibly without violating any norm, will lead to goal achievement. This is possible because norms enable the creation of expectations and commitments among agents. Moreover, given an explicit representation of such elements it will be possible to realize systems of accountability to discourage or to detect and explain deviant behavior <ref type="bibr" target="#b3">[4]</ref>.</p><p>Even though data-awareness and norm-awareness are by and large orthogonal to BDI <ref type="bibr" target="#b16">[17]</ref> notions, it is natural to think of agents as BDI agents for a seamless integration of all the aspects of deliberation, including the awareness of data and of their lifecycles. For instance, an agent, that is involved in handling orders, may conclude that, since it has to pick up three items in the warehouse, since each such item is to be packed, since all packagings are performed by a same other agent, and since one of its goals is saving energy, it is preferable to pick them up altogether, and deliver them to the other agent only afterwards, instead of picking and delivering one item at a time. Data-awareness here is awareness that three items of a same kind are requested. Norm-awareness that items are picked because each of them is part of some order, whose lifecycle says that after being picked they will be packed. Again data-awareness allows our agent to know that all parcels are to be made by a same other agent.</p><p>Relying on AOP is promising also because a the agent-based model allows to naturally tackle the issue of coordination by introducing the concept of norm <ref type="bibr" target="#b15">[16]</ref>. The deliberative cycle of agents is affected by the norms and by the obligations these norms generate as a consequence of the agents' actions. The limit of current AOP approaches is that they provide no holistic proposal where constitutive norms are used also to specify data operations, and where regulative norms are used to create expectations on the overall evolution of the system (agents behavior and environment evolution).</p><p>Environment/Information systems based on normative business artifacts. Figure <ref type="figure" target="#fig_0">1</ref> describes the high-level architecture of the kind of system we imagine: (1) involving business artifacts and agents (with their goals), and (2) holistically norm-aware. Agents interact with each other and with the environment by creating and modifying data which belong to an information system and that are reified by business artifacts. They are goal-driven and capable of coordinating with other agents by creating and exploiting commitments, obligations, permissions, and prohibitions. The conceptual model of the information system is described in terms of the norms that regulate the evolution of data, that is, data lifecycles, capturing how data pass from one state to another as a consequence of actions that are performed by some agent. Moreover, business artifacts will include all those normative elements that regulate the coordination of the agents that interact by way of the artifact. All this information is available to the interacting agents in a form that allows agents to reason on it. The agents are aware of the current state (of the lifecycle) of the data, as well as of the obligations, prohibitions, commitments, permissions put on them, and thus they are aware of the tasks expected of them and of their parties. At any time it is possible to check the execution, identifying pending tasks and who is responsible of them, while behaviors that violate some norm (e.g. some obligation or some commitment) will be automatically detected, e.g. causing the activation of procedures that are specifically designed to handle the case. As a final remark, at design time, norms would provide a programming interface between agents and their environment, given in terms of those state changes in the environment that are relevant to the agent and that the agent should tackle.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">An Exemplification with 2COMM</head><p>We now show how the above concepts can be implemented by relying on the 2COM-M/JaCaMo+ framework <ref type="bibr" target="#b2">[3]</ref>. We refer to an implementation where the BDI agents are implemented in the Jason agent programming language, and where agents share artifacts, whose creation and manipulation involves an explicit creation and manipulation of social commitments. Social commitments <ref type="bibr" target="#b12">[13]</ref> provide the normative layer and enable the coordination of the goal-driven agents. We show how the norm-driven artifactbased coordination of agents is realized in the purchase scenario. A social commitment C(x, y, s, u) captures that agent x (debtor) commits to agent y (creditor) to bring about the consequent condition u when the antecedent condition s holds (s and u are conjunctions or disjunctions of events). Only the debtor of a commitment can create it. When s is true the commitment is detached and turns into an obligation on the debtor. When u is true the commitment is satisfied. A detached commitment that is canceled or whose consequent becomes f alse is violated. The business artifact, besides representing the chunk of information at issue, maintains the created commitments, that can be inspected by the agents. Specifically agents will be notified of the changes to the business artifact state which include changes occurred to the commitments. Among other events, they will be aware of the detachment of commitments of which they are debtors, and of the satisfaction (violation) of commitments of which they are creditor.</p><p>The example implementation involves a merchant, selling on-line, and a customer agent. The merchant advertises some item and specifies the number of available units.</p><p>Its goal is to be paid for the sold units. The goal of the customer is to get the goods it is interested in. A customer starts an interaction by requesting a quotation for a number of units. When the merchant sends the quotation he also creates a commitment C(merchant, customerId, accepted(price, quantity, customer), goods(customer)), meaning that he commits with the customer that if the quotation is accepted, he will have the goods delivered to the customer. The customer is, thus, enticed to accept the quotation because the presence of the commitment, as part of the information provided by the business artifact, yields that this action will create an obligation on the merchant to deliver the goods that will make him achieve his goal. Should delivery not occur, thanks to the explicit representation of the commitment within the business artifact, and because of the violation of the obligation expressed by it, it would be possible to identify the merchant as the liable<ref type="foot" target="#foot_0">1</ref> party. The payloads (quotation, price, quantity) are stored in the business artifact. On the other hand, acceptance of a quotation binds the customer with the merchant to pay, by the creation of the commitment C(customer, merchant, goods(customer), paid), leading the merchant to satisfy his goal. After payment, the merchant is expected to send a receipt. This expected interaction involves the execution of operations that are exposed by the business artifact (quote, ship and emitReceipt for the merchant; request, accept, reject and sendEPO for the customer).</p><p>1 + r e q u e s t e d Q u o t e ( Q u a n t i t y , C u s t o m e r I d ) 2 &lt;− q u o t e ( 1 0 0 0 , Q u a n t i t y , C u s t o m e r I d ) . Above, an excerpt of the merchant agent program. The merchant is solicited to act by the reception of a requestedQuote event, that comes from a customer through the business artifact. The execution of quote sends a quotation to the customer and causes the creation of the merchant's commitment to send the goods if the quotation is accepted.</p><p>The detachment of such a commitment (due to an event raised by the customer) is notified to the merchant by the artifact alongside with the relevant information. The merchant will now try to satisfy the commitment by executing ship. The other commitment is detached when the customer pays, causing the merchant to emit a receipt. It is, thus, possible to observe how coordination is regulated by the commitments. Since commitments are created by their debtors, it is natural to assume that such debtors will have the code for tackling their detachment.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusions</head><p>The presented work is strictly related to the problem of interaction in multiagent systems. In these systems, interaction is mainly focused on the modeling of communication patterns (protocols), which are concerned with the sequence of messages that can be exchanged between two communicating agents, but disregard the information conveyed by these messages. Recent approaches such as HAPN <ref type="bibr" target="#b17">[18]</ref> and BSPL <ref type="bibr" target="#b13">[14]</ref> have started to consider also the information dimension. HAPN is formally based on automata where nodes represent states of the interaction and transitions between nodes represent the messages that can be exchanged. Transitions have a complex structure since for each message it is possible to define a guard condition on message sending. A similar approach is BSPL where the information flow is decomposed in a number of "simple protocols", each defining the schema of the messages that can be exchanged together with their parameters. Parameter are decorated as in or out (meaning it is received or emitted). BSPL provides a formal framework in which it is possible to verify properties such as liveliness and safety of a protocol. Both HAPN and BSPL, however, show some weaknesses in properly handling information. In HAPN, for instance, guards, that enable message sending, may refer to information which is not carried by the message itself, but rather maintained in an external information system, which is not an integral part of the HAPN proposal, and hence the complete verification of an interaction is not actually achievable. BSPL, on the other hand, assumes a distributed view of information. Each participant has its own knowledge base, and the progression of the interaction makes the local knowledge bases evolve. The problem, in this case, is that each participant has just a local view of the information lifecycle. Thus, an agent cannot create expectations about the behaviors of other participants as a consequence of the messages it sends. The approach we propose overcomes these limitations. Business artifacts abstract an information system, and provide the environment in which the agents, which are autonomous loci of control, interact. Both business artifacts and agents are first-class components. The autonomy and flexibility of the agents are preserved and supported; moreover, it is possible to reason both on the evolution of the business artifacts and on the interaction. This work can be extended along three main lines of research. First of all, an explicit normative layer paves the way to formal verification techniques for cross-organizational business processes. In this respect, the notion of accountability is rapidly gaining importance since, when more organizations come into play, it is even more important to trace back who is responsible for what. First steps can be found in <ref type="bibr" target="#b3">[4]</ref>. Another promising extension is to understand how agents could plan the use of business artifacts for reaching their goals. An initial attempt to use social commitments in planning has been discussed in <ref type="bibr" target="#b1">[2]</ref>, but business artifacts are yet to be considered. Finally, the standardized lifecycle of commitments can be the key for developing an agent programming methodology, similar to the one discussed in <ref type="bibr" target="#b0">[1]</ref>. The idea is to program agents so that they can properly tackle part of the events that are generated in the business artifacts of their interest; specifically, the state transitions that occur to commitments in which they are involved. To conclude, we mention RAW-SYS <ref type="bibr" target="#b9">[10]</ref>, which enriches the prescriptive process model with data-awareness.</p><p>Although RAW-SYS looks similar to a (normative) business artifact, the objectives of the two models are quite different. RAW-SYS is essentially a framework for verifying business processes taking into account both the control-and the data-flows. A normative business artifact, instead, aims at coordinating autonomous agents.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Environment/Information system based on normative business artifacts.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>5 &lt; 7 : 8 &lt;</head><label>578</label><figDesc>3 + c c ( My Role Id , C u s t o m e r R o l e I d , a c c e p t ( P r i c e , Q u a n t i t y , C u s t o m e r R o l e I d ) , 4 Goods , "DETACHED" ) : e n a c t m e n t i d ( M y R o l e I d ) − s h i p ( C u s t o m e r R o l e I d , Q u a n t i t y ) . 6 + c c ( My Role Id , C u s t o m e r R o l e I d , p a i d ( C u s t o m e r R o l e I d ) , R e c e i p t , "DETACHED" ) e n a c t m e n t i d ( M y R o l e I d ) − e m i t R e c e i p t ( C u s t o m e r R o l e I d ) .</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">The merchant himself committed to have the goods delivered in case of payment.</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgements This work was partially supported by the Accountable Trustworthy Organizations and Systems (AThOS) project, funded by Università degli Studi di Torino and Compagnia di San Paolo (CSP 2014).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Empowering agent coordination with social engagement</title>
		<author>
			<persName><forename type="first">Matteo</forename><surname>Baldoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Cristina</forename><surname>Baroglio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Federico</forename><surname>Capuzzimati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Roberto</forename><surname>Micalizio</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Artificial Intelligence</title>
				<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="volume">9336</biblScope>
			<biblScope unit="page" from="89" to="101" />
		</imprint>
	</monogr>
	<note>AI*IA 2015</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Exploiting social commitments in programming agent interaction</title>
		<author>
			<persName><forename type="first">Matteo</forename><surname>Baldoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Cristina</forename><surname>Baroglio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Federico</forename><surname>Capuzzimati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Roberto</forename><surname>Micalizio</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">PRIMA 2015: Principles and Practice of Multi-Agent Systems</title>
				<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="566" to="574" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Commitment-based agent interaction in jacamo+</title>
		<author>
			<persName><forename type="first">Matteo</forename><surname>Baldoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Cristina</forename><surname>Baroglio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Federico</forename><surname>Capuzzimati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Roberto</forename><surname>Micalizio</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundamenta Informaticae</title>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
	<note>to appear</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Computational accountability</title>
		<author>
			<persName><forename type="first">Matteo</forename><surname>Baldoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Cristina</forename><surname>Baroglio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Katherine</forename><forename type="middle">M</forename><surname>May</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Roberto</forename><surname>Micalizio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Stefano</forename><surname>Tedeschi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the AI*IA Workshop on Deep Understanding and Reasoning</title>
				<meeting>the AI*IA Workshop on Deep Understanding and Reasoning</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="56" to="62" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Artifact-centered operational modeling: Lessons from customer engagements</title>
		<author>
			<persName><forename type="first">K</forename><surname>Bhattacharya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">S</forename><surname>Caswell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kumaran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nigam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">Y</forename><surname>Wu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IBM Syst. J</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="703" to="721" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A data-centric design methodology for businessprocesses</title>
		<author>
			<persName><forename type="first">K</forename><surname>Bhattacharya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Hull</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Su</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of Research on BusinessProcess Modeling</title>
				<imprint>
			<publisher>IGI Publishing</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="503" to="531" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">What is intention?</title>
		<author>
			<persName><forename type="first">E</forename><surname>Michael</surname></persName>
		</author>
		<author>
			<persName><surname>Bratman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Intensions in Communication</title>
				<editor>
			<persName><forename type="first">P</forename><surname>Cohen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Morgan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Pollack</surname></persName>
		</editor>
		<meeting><address><addrLine>Cambridge, MA</addrLine></address></meeting>
		<imprint>
			<publisher>MIT Press</publisher>
			<date type="published" when="1990">1990</date>
			<biblScope unit="page" from="15" to="31" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Foundations of data-aware process analysis: a database theory perspective</title>
		<author>
			<persName><forename type="first">Diego</forename><surname>Calvanese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Giuseppe</forename><forename type="middle">De</forename><surname>Giacomo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marco</forename><surname>Montali</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 32nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS</title>
				<meeting>the 32nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="1" to="12" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Business Artifacts: A Data-centric Approach to Modeling Business Operations and Processes</title>
		<author>
			<persName><forename type="first">David</forename><surname>Cohn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hull</forename><surname>Richard</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Data Eng. Bull</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="3" to="9" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Add data into business process verification: Bridging the gap between theory and practice</title>
		<author>
			<persName><forename type="first">Riccardo</forename><surname>De Masellis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chiara</forename><surname>Di Francescomarino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chiara</forename><surname>Ghidini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marco</forename><surname>Montali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sergio</forename><surname>Tessaris</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence</title>
				<meeting>the Thirty-First AAAI Conference on Artificial Intelligence<address><addrLine>San Francisco, California, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">February 4-9, 2017. 2017</date>
			<biblScope unit="page" from="1091" to="1099" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Business artifacts: An approach to operational specification</title>
		<author>
			<persName><forename type="first">A</forename><surname>Nigam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">S</forename><surname>Caswell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IBM Systems Journal</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="428" to="445" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Artifacts in the A&amp;A meta-model for multi-agent systems</title>
		<author>
			<persName><forename type="first">Andrea</forename><surname>Omicini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alessandro</forename><surname>Ricci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mirko</forename><surname>Viroli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advanced Topics and Industrial Perspectives of Multi-Agent Systems</title>
				<imprint>
			<date type="published" when="2008-12">December 2008</date>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="432" to="456" />
		</imprint>
	</monogr>
	<note>Special Issue on Foundations</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">An ontology for commitments in multiagent systems</title>
		<author>
			<persName><forename type="first">P</forename><surname>Munindar</surname></persName>
		</author>
		<author>
			<persName><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell. Law</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="97" to="113" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Information-driven interaction-oriented programming: BSPL, the blindingly simple protocol language</title>
		<author>
			<persName><forename type="first">P</forename><surname>Munindar</surname></persName>
		</author>
		<author>
			<persName><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="491" to="498" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">NoBPM: Supporting Interaction-Oriented Automation via Normative Specifications of Processes</title>
		<author>
			<persName><forename type="first">P</forename><surname>Munindar</surname></persName>
		</author>
		<author>
			<persName><surname>Singh</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
	<note>Invited talk, BPM</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Back to norms! on the scope and dynamics of norms and normative action</title>
		<author>
			<persName><forename type="first">Göran</forename><surname>Therborn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Current Sociology</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="page" from="863" to="880" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Introduction to multiagent systems</title>
		<author>
			<persName><forename type="first">J</forename><surname>Michael</surname></persName>
		</author>
		<author>
			<persName><surname>Wooldridge</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Wiley</publisher>
		</imprint>
	</monogr>
	<note>2nd edition</note>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A tool for defining agent protocols in HAPN: (demonstration)</title>
		<author>
			<persName><forename type="first">Nitin</forename><surname>Yadav</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Lin</forename><surname>Padgham</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><surname>Winikoff</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, AAMAS</title>
				<meeting>the 2015 International Conference on Autonomous Agents and Multiagent Systems, AAMAS</meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="1935" to="1936" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
