<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Bounded-Monitor Placement in Normative Environments</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Guilherme Krzisch y</string-name>
          <email>guilherme.krzisch@acad.pucrs.br</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nir Oren z</string-name>
          <email>n.oren@abdn.ac.uk</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Felipe Meneguzzi y</string-name>
          <email>felipe.meneguzzi@pucrs.br</email>
        </contrib>
      </contrib-group>
      <abstract>
        <p>In order to sanction non-compliant agents, norm violations must be detected, which in turn requires norm monitoring. This paper examines the problem of monitor placement within a normative multi-agent system under budgetary constraints. More specifically we consider a system containing (1) a set of possible monitors able to determine the state of a subset of the domain; (2) costs associated with deploying the monitors; and (3) a set of norms for which compliance must be monitored, and which, if violated, result in a penalty. We seek to identify which combination of monitors maximizes the system's utility. We formalize the problem and evaluate approximate solutions using several heuristics, empirically demonstrating their efficiency.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        Since agents within open multi-agent systems cannot be assumed to share goals,
obtaining desirable outcomes requires a coordination mechanism, and norms [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] are often
used to perform this coordination. While regimented norms – which prevent an agent by
design from undertaking undesirable behavior – are widely often assumed, a substantial
body of work has shown the advantages of using approaches based on enforcement [
        <xref ref-type="bibr" rid="ref10 ref8">8,
10</xref>
        ]. These latter approaches, which allow norms to be violated, require a mechanism
that monitors for norm compliance or violation and applies sanctions when
appropriate [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. In turn, norm enforcement can be performed either by some organization or by
other autonomous agents in the system [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        Norm enforcement assumes that violation and compliance can always be detected
[
        <xref ref-type="bibr" rid="ref11 ref6 ref7">6, 7, 11</xref>
        ]. Such an assumption is, however, clearly unrealistic. First, in a large system,
the cost of monitoring is very high [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Second, there are often portions of the
environment that are not fully observable, and which monitors cannot access. There is therefore
a need to investigate how norms should be monitored.
      </p>
      <p>
        Previous work on the monitoring of norms has considered how norms should be
modified so as to be monitorable [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], and whether related states can be observed which
may indicate upcoming norm violations [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In this paper, we consider instead how
monitors should be deployed within a system, assuming that such deployments have a
cost, so as to monitor the most important norms. Our approach builds on ideas from
the planning literature, and in Section 2, we introduce the necessary concepts from this
domain and formalize the notion of a norm. Section 3 introduces monitors and formally
describes the problem we are addressing. We describe several approaches to addressing
the problem in Section 4. Finally, Section 5 evaluates our solutions, and we conclude
by considering related work (Section 6) and directions for future research (Section 7).
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>In this section we introduce concepts from the planning literature, used to formalise the
system and our solution. Following this, we describe norms within our system.
2.1</p>
      <sec id="sec-2-1">
        <title>Planning</title>
        <p>We build on classical planning, which assumes finite, fully observable and
deterministic systems, and adapt the definitions from Ghallab et al. [9, Ch. 2]. Systems that
follow classical planning semantics assume that actions in the domain cause transitions
between states, and are specified in terms of sets of predicates.</p>
        <p>Definition 1 (Predicate and State). A predicate in a first-order language L is
composed of a symbol and zero or more terms. Each term can be either a constant or a
variable; a predicate is ground if it does not contain variables. We denote as jLj the
number of ground predicates in this language. A state is a set of ground literals (i.e.,
positive or negative predicates) in L.</p>
        <p>We use the operator j= to specify that a state (a set of predicates) satisfies a logical
formula, i.e., that a formula is a model of the state.</p>
        <p>Classical planning makes a closed-world assumption — that if a state does not
specify a predicate, then this predicate does not hold in that state. We write s j= P where P
is a set of ground predicates, if the conjunction of these ground predicates is satisfied
by s. We formalize action execution, and its effects on the environment as follows.
Definition 2 (Planning Operator and Actions). A planning operator is represented by
a triple o = hname(o); pre(o); ef f (o)i, where name(o) is the description of o. pre(o)
and e (o) are set of predicates representing the planning operator’s preconditions and
effects. An action a is a ground instance of a planning operator, and is applicable in
state s only if s j= pre(a). The result of applying action a to state s is a new state s0,
such that s0 = (s=e (a)) [ e +(a), where e = e + (such that e + \
e = ;) and e is the set of negated predicates and e[ e+ is the set of positive
predicates.</p>
        <p>We specify the dynamics of our multiagent system in terms of a transition
function following classical planning semantics in Definition 3, and the initial states of the
system in terms of planning problem instances, as per the following definitions.
Definition 3 (Planning Domain). If L is a first-order language with finite sets of
predicates and constants, a planning domain in L is a state-transition system = hS; A; i,
where S 2jLj is a subset of all possible states; A is the set of all ground instances of
planning operators; (s; a) is a state-transition function defined as follows: if a 2 A
and a is applicable to s 2 S, it returns the next state s0 2 S, which is the result of
applying action a to state s.</p>
        <p>Note that S is closed under , i.e., given a state s 2 S, all states reachable from
applying action a in s are also in S.</p>
        <p>Definition 4 (Planning Problem). A planning problem is defined as a triple P =
h ; s0; gi, where is the state-transition system, s0 2 S is the initial state of the
problem and g, the goal, is a set of ground predicates.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Norms</title>
        <p>
          In open and dynamic societies, self-interested agents cannot be assumed to share the
same set of goals. In this context, norms can be used to regulate and coordinate behavior
[13, Ch. 14]. For our work, we adapt the definition of a norm from [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. We consider
two norm types: obligations and prohibitions; the former specifies behavior that must
be followed by agents, while the latter specifies behavior that must be avoided.
Definition 5 (Norm). A norm is a tuple n = h ; ; ; Ci, where:
– 2 fobligation; prohibitiong represents the norm’s modality;
– is a set of ground predicates that represents the context to which a norm applies,
i.e., a norm is applicable in state s if s j= ;
– 2 A represents the object of the norm’s modality;
– C is the cost or penalty to the society which occurs if the norm is violated.
Example 1. The following norm requires an agent to drive on the left side of the road
if they are in England; a violation causes harm to the society worth 20 units of utility.
        </p>
        <p>n0 = hobligation; at (England ); driveLeft (a; b); 20i</p>
        <p>We now describe when a norm is considered to be violated by an agent.
Definition 6 (Norm Violation). A norm n = h ; ; ; Ci is violated in state s by an
agent a iff:
– s j= ; and
– agent a either: executes action
execute action in state s and</p>
        <p>in state s and
= obligation.</p>
        <p>= prohibition; or does not</p>
        <p>A violated norm has an undesirable impact on the society, as encoded by its cost C.
To dissuade agents from violating norms, when such a violation is detected, an enforcer
applies a penalty to the agent. In this work, we do not consider the nature of this penalty,
assuming instead that it is sufficiently large to prevent the agent from violating a norm
if such a violation can be detected. We must therefore consider how to place monitors
so that violations are detected, while minimizing monitor costs. We refer to this as the
bounded-monitor placement problem, and describe it in more detail in the next section.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Bounded-Monitor Placement Problem</title>
      <p>We consider a set of monitors able to determine whether some combination of
predicates is, or is not satisfied. Formally, we define a monitor as follows.</p>
      <p>Definition 7 (Monitor). A monitor m = hP; Di consists of a set of predicates P , and
a deployment cost D 2 R. We refer to the predicates of a monitor m as Pm, and to its
cost as Dm.</p>
      <p>A set of monitors can be used to monitor more complex combinations of
predicates. Some monitors can conceivably detect the status of a predicate related to multiple
norms, or when combined, can be used to determine the status of a norm that
individual monitors cannot. We formalize the combination of monitors aiming to cover sets of
norms as a Monitor Placement.</p>
      <p>Definition 8 (Monitor Placement). A monitor placement MP is a tuple hM1; M2i,
where M1 and M2 are sets of monitors, representing the capability of observing
predicates in the current and in the next state, assuming an action was performed.</p>
      <p>A monitor placement detects a norm violation h ; ; ; Ci iff given a state s and s0
such that s0 is the result of applying an action at s; and s j= , one of the following
holds:
1.
2.</p>
      <p>= prohibition and s j= VfPm1 jm1 2 M1g and s0 j= VfPm2 jm2 2 M2g.
= obligation and s j= VfPm1 jm1 2 M1g and s0 6j= VfPm2 jm2 2 M2g.
PnT2hNeCc,owsthCereofNaismtohneistoetr opflancoermmesndteitsecPtedmb2yMt1h_ismp2lMac2eDmemn,t.while the utility U is</p>
      <p>By introducing the concept of an available budget, we define our problem of placing
monitors in a system as follows.</p>
      <sec id="sec-3-1">
        <title>Definition 9 (Bounded-Monitor Placement Problem). A bounded-monitor placement</title>
        <p>problem is encoded as a triple hM; N; Bi where M is a set of monitors, N is a set of
norms, and B 2 R+ is a budget.</p>
        <p>A solution to the problem is a monitor placement MP such that its cost is smaller
than, or equal to, the budget.</p>
        <p>The set of possible solutions for a monitor placement problem is exponential in the
worst case, and in the next section, we suggest several approaches to finding solutions.
4
4.1</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Solution</title>
      <sec id="sec-4-1">
        <title>Brute-force</title>
        <p>A brute-force approach is a trivial solution to this problem. It considers all possible
combinations of available monitors and returns the best one. We can clearly see that
this is impractical for large problems, as its complexity increases exponentially given
the size of the possible monitors set input: specifically, it has a time complexity of
O(22jMj). We use this approach as a baseline against which we compare the remaining
heuristics.
4.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>Mapping from norms to monitors</title>
        <p>The main drawback of the brute-force approach is that it includes a large number of
irrelevant solutions while enumerating all possible solutions. We can reduce this
overhead by computing a mapping from norms to monitor placements, i.e., by finding the
set of all monitor placements capable of monitoring each norm.</p>
        <p>With this mapping, we can compute possible solutions by choosing one monitor
placement for each norm. Generalizing, we have QjiN=1j(jMPni j + 1) possible solutions,
where MPni is the set of monitor placements able to monitor norm ni; since we also
need to consider whether it is practical to monitor a given norm (e.g., when there is
no available budget to do so), we need to add the empty monitor placement set. In the
best case we have only one possible monitor placement for each norm, and in the worst
case we have all possible combinations of available monitors for MP M1 and MP M2 ,
for each norm. Therefore, the number of solutions ranges from 2jNj to 4jMjjNj.</p>
        <p>Given this exponential complexity, it is clear that both the brute force and monitor
mapping approaches cannot scale up to larger problem sets. We must therefore consider
heuristics for addressing the problem, which we describe next.
4.3</p>
      </sec>
      <sec id="sec-4-3">
        <title>Naive Approximate Solution</title>
        <p>To improve performance compared to the brute-force approach we introduce a simple
approximate solution whose purpose is to serve as a a baseline for comparing the
accuracy of the other solutions. This solution iterates over monitors ranked by their expected
probability of detecting norm violations. To rank monitors, we consider the number of
norms that a single monitor can partially detect — a monitor can partially detect a norm
if it has at least one predicate of the norm’s context or of the preconditions of the norm’s
action . The intuition here is that choosing monitors that can partially observe several
norms leads to a final monitor placement that can detect many existing norms.</p>
        <p>This approach, however, does not capture essential parts of the problem. First, it
does not consider the norm’s penalty and monitor’s cost. Second, it has an overly strong
assumption that joining monitors that can partially detect norms will lead to a monitor
placement that can actually detect norms. We can therefore enhance this approach by
using the mapping describe in Section 4.2 together with a greedy search.
4.4</p>
      </sec>
      <sec id="sec-4-4">
        <title>Greedy Solution</title>
        <p>We propose two approaches with different heuristics using the mapping structure
introduced in Section 4.2. By using a heuristic to rank the best monitor placements, we
can avoid searching through an exponential solution search space. More specifically,
we select the best monitor placement candidate for each norm. The resulting heuristic
sacrifices optimality for efficiency, running in linear time.</p>
        <p>Our base algorithm (used for both of our heuristics) is described in Algorithm 1.
It starts by creating a mapping between norms and monitor placements, as described
in Section 4.2. After this, it adds monitors to an initially empty monitor placement
currentMP , while budget is available. Within each iteration, it selects one norm, gets
a monitor placement able to monitor this norm, and adds the already selected monitors
Algorithm 1 Greedy algorithm
1: procedure FINDAPPROXIMATESOLUTION(N:Norms)
2: build mapping from norms to monitor placements
3: currentMP fg
4: while hasBudget do
5: n extractMaxNorm(N )
6: mp getMinMP (n)
7: currentMP currentMP [ mp</p>
        <p>return currentMP
(currentMP ) to the monitor placement. We now describe two heuristics to speed up
this algorithm.
4.4.1 Norm Independence Heuristic Our first heuristic considers norms to be
monitored completely independently of each other when choosing monitors in order to
substantially prune the search space of the problem. We first need to define which norm
extractMaxNorm(N) in line 5 of Algorithm 1 chooses. Here, we select the norm with
the highest penalty, in order to increase the value of U (the sum of each individual norm
penalty), i.e., extractMaxNorm(N ) = arg maxn2N Cn.</p>
        <p>The other decision required is which monitor placement is selected by the
getMinMP(n) method (line 6). For this, we select the placement with the lowest cost,
as it is a good monitor placement able to monitor norm n. Thus, getMinMP (n) =
arg minMP2MPn CMP .</p>
        <p>This approach does not consider the intersection of monitors that are able to
monitor multiple norms; it selects monitor placements independently of the others.
Consequently, we improve this solution in what follows by introducing the concept of current
cost to try to find a better approximate solution for our problem.
4.4.2 Add and Update Heuristic The structure of this heuristic is similar to the
previous approach. However, instead of using the cost of each monitor placement as the
metric to select the one with lowest budget, we use its current cost. The current cost
of a given monitor placement M P is computed as per Formula 1 below, and considers
only the cost of monitors that were not already selected in a previous iteration (and thus
not in the set of monitors of currentMP).</p>
        <p>CCMP =</p>
        <p>X</p>
        <p>Dm
m2MMP ^m62McurrentMP
getMinMP (n) = arg min CCMP</p>
        <p>MP 2MPn
extractMaxNorm(N ) = arg max
n2N</p>
        <p>Cn
CCgetMinMP(n)
(1)
(2)
(3)
The getMinMP(n) method is implemented as per Formula 2, which we use to compute
the next norm to be monitored using the extractMaxNorm(N) method, implemented in
Formula 3. This heuristic chooses the norm with the highest value based on the ratio
between its penalty and the lowest current cost of the set of monitor placements. By
using the current cost, we disregard the costs of monitors that have already been chosen
in past iterations, yielding better estimates. In the next section we empirically evaluate
the different approaches proposed in this section.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Experiments and Results</title>
      <p>To empirically evaluate our approaches, we automatically generate sets of norms and
sets of monitors with increasing complexity. In our experiments, we assumed the set
of monitors M2 of a monitor placement can in effect see all actions that were executed
from the states visible by M1; i.e., we assume that our monitor placement is always able
to check the next state after applying a given action. While this is a strong assumption
and makes our problem easier to solve, it still captures the exponential nature of the
bounded-monitor placement problem. Our experiments are based on standard planning
problems [], and our main domain is the drink-driving domain, where agents are able
to drive between cities, and there is a norm stating that it is forbidden to drive while
drunk; we also tested with blocksworld, depots, dwr, easy ipc grid, gripper, logistics
and robby domains.</p>
      <p>There are two metrics to consider when analyzing results: time performance and
accuracy. When comparing time performance we use the brute-force approach as a
baseline for the approximate approaches. In Figure 1 we can see that the brute-force
approach becomes intractable for a relative small number of norms, while the approximate
approaches remain linear as the number of norms increases.</p>
      <p>60000 Brute-force
50000 Approximate Approach
) 40000
s
(em 30000
m
iT 20000
10000
0
5
10
250 Norm Independence
200 Add and Update
)sm 150
(
e
iTm 100
50
0
15
Number of Norms
20
25
30
50
100 150
Number of Norms
200
250
comparing with the brute-force approach, these results are limited to small problems
that this approach can solve1. In this experiment, both greedy approaches outperform
the naive solution; between the two greedy approaches, the second one (Add and Update
Heuristic) has, in almost all domains, greater accuracy, and — in all cases — a smaller
standard deviation. For the depots, gripper and logistics domain, the second solution
achieves optimal accuracy; this can be explained as these domains become intractable
even for small number of norms, and thus the number of problems in this experiment,
for these domains, is also small. The increase in performance from the first to the
second greedy approach is relatively small for these domains; while it is relatively large
for the drinkdriving and robby domains.</p>
      <p>To investigate if the relationships found for the first experiment hold for large
problems, we perform additional experiments, shown in Figure 3. As these problems cannot
be solved in a timely manner using a brute-force approach, in order to calculate their
accuracy we compare them with a perfect solution that could monitor all norms, but
that does not necessarily need to respect the available budget. This perfect solution has
the maximum value of U, which can be unattainable for actual solutions to these
problems; therefore, in this experiment we are interested in the relative accuracy between
the approximate approaches, and not in how close they are to the perfect solution.</p>
      <p>We can see the same pattern in this experiment; the greedy approaches perform
better than the naive solution, with a slight advantage for the Add and Update Heuristic.
The increase in performance from the first to the second greedy approach remains large
for the drinkdriving domain, while for other domains it is relatively small.</p>
      <p>From the experiments we conclude that brute-force solution is intractable for all but
small problems, while approximate approaches can solve large problems. The accuracy
of the greedy approaches is better than the naive solution, with a slight advantage to
the second greedy approach. This advantage is more noticeable for small problems; for
large problems — as we do not have the value for the optimal solution — this difference
is smaller.
1 We set a timeout of 30 seconds for this experiment.</p>
    </sec>
    <sec id="sec-6">
      <title>Related Work</title>
      <p>
        Other authors also dropped the assumption that a monitor has full observability in the
system. Criado’s [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] approach is similar to our work; their norms are more expressive,
and for their solution they use the CEF algorithm which uses a greedy approach.
However, they do not perform an empirical evaluation, or consider whether their approach is
able to actually monitor any norm, as there are no guarantees proven for their proposed
algorithm. Alechina et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] models a set of queries that a monitor can ask in a state,
i.e., a monitor may not be able to distinguish between two states. They then modify
the set of norms to a new set of approximate norms that can be optimally monitored
given a set of monitors and queries, therefore approaching the problem from another
perspective.
      </p>
      <p>
        Alechina et al. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] define norms using LTL (linear temporal logic) formulas. They
introduce the concept of a guard, which uses lookahead mechanisms to detect future
norm violations. The size of the lookahead window is bounded to reduce the amount
of computation in the future (they have complete knowledge of the past), and have
similarities with the concept of monitor cost in our work. The main difference is that,
while we use a combination of monitors to be able to detect a norm violation, they
increase their lookahead window size to increase their monitoring capabilities, also
increasing its computational cost.
      </p>
      <p>
        Finally, our work is also similar to that of Bulling et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]; both include the
concept of monitors and combination of monitors. While we use a relatively simple norm
formalism and optimize the cost to monitor these norms, their specification uses
LTLformulas, focusing on its properties and relations. Their current framework does not
include norms or monitors costs.
7
      </p>
    </sec>
    <sec id="sec-7">
      <title>Conclusion and Future Work</title>
      <p>In this paper we extend the state of the art in norm monitoring by dropping the
assumption that a monitor system has full observability, i.e., that monitors can observe all
actions performed. Adding the notion of a set of available monitors and an associated
cost results in the problem of finding a monitor placement in order to maximize the
number of detectable violations. While brute-force solutions are impractical because
the possible solution search space is exponential in the size of input, we propose
heuristics that use a mapping between norms and monitors to find approximate solutions. Our
empirical of runtime performance and accuracy shows that these heuristics are both
practical in computational terms and approach optimal performance for many realistic
domains from the planning literature.</p>
      <p>We aim to extend the work in at least three ways. The first is to allow monitors to
dynamically modify their placement during execution. In this setting, monitors would
be able to observe agent actions and move to locations where more norm violations
occur. The second extension would be to consider different agents being able to perform
concurrent actions, and how to build monitors able to correctly identify which agent
violated a given norm. The third is to allow more complex expressions representing
both what monitors can observe and how monitors can be combined, as currently we
only consider conjunctions of monitors. This can increase the richness of our approach,
and we intend to investigate heuristics for the use of such more expressive monitors.</p>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgments</title>
      <p>This work is partially supported by grants from CNPq/Brazil numbers 132339/2016-1
and 305969/2016-1.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Alechina</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bulling</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dastani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Logan</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Practical run-time norm enforcement with bounded lookahead</article-title>
          .
          <source>In: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems</source>
          . pp.
          <fpage>443</fpage>
          -
          <lpage>451</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Alechina</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dastani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Logan</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Norm approximation for imperfect monitors</article-title>
          .
          <source>In: Proceedings of the 2014 International Conference on Autonomous Agents and Multiagent Systems</source>
          . pp.
          <fpage>117</fpage>
          -
          <lpage>124</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bulling</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dastani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Knobbout</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Monitoring norm violations in multi-agent systems</article-title>
          .
          <source>In: Proceedings of the 2013 International Conference on Autonomous Agents and Multiagent Systems</source>
          . pp.
          <fpage>491</fpage>
          -
          <lpage>498</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Criado</surname>
          </string-name>
          , N.:
          <article-title>A practical resource-constrained norm monitor</article-title>
          .
          <source>In: Proceedings of the 2017 International Conference on Autonomous Agents and Multiagent Systems</source>
          . pp.
          <fpage>1508</fpage>
          -
          <lpage>1510</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Dignum</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Autonomous agents with norms</article-title>
          .
          <source>Artificial Intelligence and Law</source>
          <volume>7</volume>
          (
          <issue>1</issue>
          ),
          <fpage>69</fpage>
          -
          <lpage>79</lpage>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Esteva</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosell</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rodriguez-Aguilar</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arcos</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          :
          <article-title>Ameli: An agent-based middleware for electronic institutions</article-title>
          .
          <source>In: Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems</source>
          . pp.
          <fpage>236</fpage>
          -
          <lpage>243</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Garc</surname>
          </string-name>
          <article-title>´ıa-</article-title>
          <string-name>
            <surname>Camino</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Noriega</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <article-title>Rodr´ıguez-</article-title>
          <string-name>
            <surname>Aguilar</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          :
          <article-title>Implementing norms in electronic institutions</article-title>
          .
          <source>In: Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems</source>
          . pp.
          <fpage>667</fpage>
          -
          <lpage>673</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Garc</surname>
          </string-name>
          <article-title>´ıa-</article-title>
          <string-name>
            <surname>Camino</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <article-title>Rodr´ıguez-</article-title>
          <string-name>
            <surname>Aguilar</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sierra</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasconcelos</surname>
            ,
            <given-names>W.:</given-names>
          </string-name>
          <article-title>Constraint rulebased programming of norms for electronic institutions</article-title>
          .
          <source>In: Proceedings of the 2009 International Conference on Autonomous Agents and Multiagent Systems</source>
          . pp.
          <fpage>186</fpage>
          -
          <lpage>217</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Ghallab</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nau</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Traverso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <source>Automated planning: theory &amp; practice. Elsevier</source>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Luck</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>d'Inverno</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Constraining autonomy through norms</article-title>
          .
          <source>In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems</source>
          . pp.
          <fpage>674</fpage>
          -
          <lpage>681</lpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Modgil</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faci</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meneguzzi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oren</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miles</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Luck</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A framework for monitoring agent-based normative systems</article-title>
          .
          <source>In: Proceedings of the 2009 International Conference on Autonomous Agents and Multiagent Systems</source>
          . pp.
          <fpage>153</fpage>
          -
          <lpage>160</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Oren</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Panagiotidi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <article-title>Va´zquez-</article-title>
          <string-name>
            <surname>Salceda</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Modgil</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Luck</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miles</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Towards a formalisation of electronic contracting environments</article-title>
          . In: Coordination, Organizations, Institutions and Norms in Agent Systems IV, pp.
          <fpage>156</fpage>
          -
          <lpage>171</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Ossowski</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Agreement technologies</article-title>
          ,
          <source>vol. 8</source>
          . Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Savarimuthu</surname>
            ,
            <given-names>B.T.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cranefield</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Norm creation, spreading and emergence: A survey of simulation models of norms in multi-agent systems</article-title>
          .
          <source>Multiagent and Grid Systems</source>
          <volume>7</volume>
          (
          <issue>1</issue>
          ),
          <fpage>21</fpage>
          -
          <lpage>54</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Sutinen</surname>
            ,
            <given-names>J.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Andersen</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>The economics of fisheries law enforcement</article-title>
          .
          <source>Land economics 61(4)</source>
          ,
          <fpage>387</fpage>
          -
          <lpage>397</lpage>
          (
          <year>1985</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>