<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>R. G. Smith and R. Davis. Frameworks for
Transactions on Systems, Man, and Cybernetics</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>A Knowledge Production Protocol for Cooperative Development of Learning Objects</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Juan M. Dodero Miguel A. Sicilia</string-name>
          <email>dodero@inf.uc3m.es</email>
          <email>dodero@inf.uc3m.es masicilia@inf.uc3m.es</email>
          <email>masicilia@inf.uc3m.es</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Elena García-Barriocanal</string-name>
          <email>elena.garciab@uah.es</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Computer Science, Department, Universidad de Alcalá de</institution>
          ,
          <addr-line>Henares, 28871 Alcalá de Henares, Madrid</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>DEI Laboratory DEI Laboratory, Universidad Carlos III de Universidad Carlos III de</institution>
          ,
          <addr-line>Madrid Madrid, Avda. de la Universidad, 30 Avda. de la Universidad, 30, 28911 Leganés 28911 Leganés, Madrid</addr-line>
          ,
          <country country="ES">Spain</country>
          <addr-line>Madrid</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1994</year>
      </pub-date>
      <volume>11</volume>
      <issue>1</issue>
      <abstract>
        <p>Categories and Subject Descriptors</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>1. INTRODUCTION
1http://www.microsoft.com/elearn/support.asp
2http://www.peer3.com/text/software/software.html
3http://home.click2learn.com/products
opment can be also extended to resources or metadata
secthe tableofcontents structure of the organizations
section in the manifest le. Nevertheless, collaborative
develtions.
resources, and metadata). Then, the author submits a
section 3.3. Then, a negotiation protocol is executed by
continues until an agreement is reached or some degree of
substituted by a further elaborated proposal. This process
proposal, including the dierences bet ween both les, and
refering to tableofcontents negotiation. The rest of
collabconsensus is achieved.
orating authors receive and evaluate the proposal, according
to a set of previously agreed criteria, like those described in
every author until the proposal is eventually accepted, or
1.2 Cooperative development of learning
objects
mains.
multiple-tier architecture, where cooperative agents
collaborate in lower-level domains to consolidate some knowledge,
architecture. Nevertheless, it can be easily extended to a
Because of simplicity, we dene a t wo-tier cooperative work
before they try to collaborate or compete in higher-level
do2. COOPERATIVE KNOWLEDGE
PRODUC</p>
      <p>TION ARCHITECTURE
ticipants may keep their own pace within the interchange.
ulty sta in a virtual univ ersity, cooperativ e development
In a highly distributed environment for instance, the
facAlthough, a group of agents can jointly, asynchronously
dequent. The exchange of ideas between members of the
dischronous ph ysical or virtual meetings is quite less
fretivities.
of learning objects becomes harder, since the holding of
synvelop learning objects if they coordinate their creation
actributed workgroup is an asynchronous process, where
parCooperative Knowledge Mart</p>
      <p>Supervisor</p>
      <p>Agent</p>
      <p>Cooperative Knowledge Mart
Supervisor</p>
      <p>Agent</p>
    </sec>
    <sec id="sec-2">
      <title>Supervisor Agent</title>
      <p>Cooperative Knowledge Warehouse</p>
    </sec>
    <sec id="sec-3">
      <title>Colaborative Agent Colaborative Agent</title>
      <p>Knowledge Mart C
3. AGENT NEGOTIATION IN A
KNOWL</p>
      <p>EDGE MART
thus recording the history of negotiation and their
decisions.
3. Agents can deliberate and achieve an internal state,
3.3 Proposal Relevance</p>
      <p>3.1 Negotiation Principles</p>
      <p>3.2 Messages
4. NEGOTIATION PROTOCOL IN A CKM
dependent on attributes of k, in such a way that if
of a proposal k in a CKM returns a numerical value,
6= then 6= ki kj, u(ki) u(kj).
Proposal relevance function The relevance function u(k)
Rule 3 If receives a n) message from other Ai proposal(kj;
Then, proceeds as follows: Ai
uates the new proposal . If then sets a kj ki kj, Ai
new time out waiting for proposal to be ratied. t1, kj
agent referring to the same negotiation n, eval- Aj, Ai
1. If does not receive any proposal referred to Ai
negotiation n before expires, then initiates t1 Ai
back the protocol in Rule 1 with the same
proposal ki.
same negotiation n, then gives up the initial Ai
2. If receives a n), with Ai consolidate(kj; kj ki,
proposal and the protocol nishes unsuccessfully .
for j 6= i, before expires, and referring to the t1
phase receives a proposal that is evaluated as (t0-waiting)
the distribution phase, that occurs after an agent submits a
preferred.
that can be noticed in the negotiation process. is used for T0
tion phase, that occurs if an agent that is in its distribution
We are considering two dieren t timeouts, one for each phase
proposal by executing Rule 1. is used for the consolida- T1</p>
      <p>Rule C If did not sent any message referred to the Ai
same negotiation n, it does nothing.
in the negotiation process back to and Aj,
extends timeout. t1
If then sends last proposal it sent kj ki, Ai
following actions:
Rule A If sent a n) and is waiting Ai proposal(ki;
for timeout, then it can perform one of the t0
If receives a ; n) from Ai consolidate(kj Aj:</p>
      <p>4.1 Activation Events
processes. Each negotiation process is handled separately,
by initiating a new execution thread of the protocol.</p>
      <p>A cooperative agent can participate in several negotiation Ai
ously submitted proposal, until a counter-proposal is
elabposal that is evaluated as preferred, a new timeout is set t1
waiting for timeout. Then, if the agent receives a pro- t0
orated. An agent that has not reached this state will be
to give it a chance. But if the preferred proposal is not
eventually ratied, then the agent goes on about its aims
agent may provoke a momentary retraction from a
previand will try again to consolidate its own proposal.</p>
      <p>In any moment, the reception of a message from another
with the same proposal.
as in step 3-1 and initiates back the protocol
If then acts in the same manner kj ki, Ai
4.2 Protocol Variants
4.3 Implementation
are proposed to be dynamic, depending on agents’
ontologytiveness of the model. Our work does not consider yet how
The architecture presented here is a bottom-up approach to
well-dened. The structuring of knowledge marts can help
holds responsibilities on some domain level knowledge, while
cooperation level knowledge interfaces to other domains are
to other knowledge production tasks, as software
developbased expressed interests.
knowledge marts are set up. As a future work, knowledge
further validation is needed to assess the usefulness of the
to reduce inconsistencies between agent territories. The
coment, specially in analysis and design phases. Nevertheless,
the design of cooperative multi-agent systems. Every CKM
mart generation and the participation of agents in CKMs
protocol in dieren t scenarios, and we are conducting tests
operative approach presented in this work is also applicable
on the impact of the number of agents in the overall
eec</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>F.</given-names>
            <surname>Herrera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Herrera-Viedma</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Verdegay</surname>
          </string-name>
          . A
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>Group</given-names>
            <surname>Decision</surname>
          </string-name>
          and Negotiation,
          <volume>5</volume>
          :
          <fpage>165176</fpage>
          ,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>linguistic decision process in group decision making.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Addison-Wesley</surname>
          </string-name>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>Deploying Java Mobile Agents with Aglets</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D. B.</given-names>
            <surname>Lange</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Oshima</surname>
          </string-name>
          . Programming and
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>of Software Engineering</source>
          ,
          <volume>10</volume>
          (
          <issue>6</issue>
          ):
          <fpage>681711</fpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>engineering cooperative agents</article-title>
          .
          <source>International Journal</source>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S. T.</given-names>
            <surname>Yuan</surname>
          </string-name>
          and
          <string-name>
            <given-names>Z. L.</given-names>
            <surname>Wu</surname>
          </string-name>
          .
          <article-title>An infrastructure for</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>Theory and Decision</source>
          ,
          <volume>28</volume>
          :
          <fpage>203242</fpage>
          ,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sycara</surname>
          </string-name>
          .
          <article-title>Persuasive argumentation in negotiation.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>IMS</given-names>
            <surname>Global Learning</surname>
          </string-name>
          <article-title>Consortium</article-title>
          . IMS Content
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <given-names>Learning</given-names>
            <surname>Consortium</surname>
          </string-name>
          , Inc.,
          <string-name>
            <surname>Dec</surname>
          </string-name>
          .
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>Packaging</given-names>
            <surname>Specication</surname>
          </string-name>
          .
          <source>T echnical report, IMS Global</source>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>P. C.</given-names>
            <surname>Fishburn</surname>
          </string-name>
          .
          <article-title>Utility Theory for Decision Making</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>York</surname>
          </string-name>
          ,
          <year>1969</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>Robert E. Krieger Publishing Co.</given-names>
            ,
            <surname>Huntington</surname>
          </string-name>
          , New
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <article-title>Managing the Knowledge Process</article-title>
          . John Wiley &amp; Sons,
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>E.</given-names>
            <surname>Swanstrom</surname>
          </string-name>
          .
          <article-title>Knowledge Management: Modeling and</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Mayeld</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Labrou</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Finin</surname>
          </string-name>
          . Desiderata for
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <article-title>agent communication languages</article-title>
          .
          <source>In AAAI Spring</source>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <source>Symposium on Information Gathering</source>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>