<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Multi-agent System for Collaborative Bookmarking</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Rushed</forename><surname>Kanawati</surname></persName>
							<email>rushed.kanawati@lipn.univ-paris13.fr</email>
							<affiliation key="aff0">
								<orgName type="institution">LIPN-CNRS UMR Q</orgName>
								<address>
									<addrLine>7030, 99 Av. J. B. Clément</addrLine>
									<postCode>F-93430</postCode>
									<settlement>Villetaneuse</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Maria</forename><surname>Malek</surname></persName>
							<email>maria.malek@eisti.fr</email>
							<affiliation key="aff1">
								<orgName type="institution">LAPI-EISTI</orgName>
								<address>
									<addrLine>Av. du Parc</addrLine>
									<postCode>F-95011</postCode>
									<settlement>Cergy</settlement>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A Multi-agent System for Collaborative Bookmarking</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">199E85A680C2F5F350C469B0BEC860E2</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T06:42+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Collaborative Information Agents</term>
					<term>Bookmark</term>
					<term>Hybrid Neural/CBR classification</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this paper we describe a multi-agent system, called COWING that aims at enabling an organised group of people to share their results of information searching on the World Wide Web. Users normally save relevant sites they found in their private collections of bookmarks. The goal of the proposed system is to enable users to share their bookmarks, in an implicit, secure and effective way. By implicit we mean that users are not required to spend extra effort in order to use the system. Secure sharing refers to the capacity of each user to control who knows what about her/his own bookmark collections. Finally effectiveness is ensured by recommending users with relevant bookmarks that are computed by applying a distributed collaborative filtering algorithm. Recommended bookmarks are automatically inserted in the most appropriate bookmark folder in the user's local collection. When accessing a folder the user can evaluate (accept or reject) provided recommendations. Our system is a multi-agent system where each user is associated to an assistant agent, called a WING agent. A WING agent observes the user's behaviour when managing her/his own bookmark collection. It learns how the user classifies her/his bookmarks. A hybrid neural/case-based reasoning supervised classifier is used for this purpose. WING agents exchange bookmarks according to a defined collaboration protocol that protects associated users privacy.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>1.À Introduction</head><p>The most intelligent agents that browse and index sites on the World Wide Web (the Web hereafter) still to be humans. Consequently, an effective way to locate relevant information on the Web is to locate people who are likely to know where to find the searched information <ref type="bibr" target="#b24">[25]</ref>. Users usually store addresses of relevant Web sites in a bookmark directory. Almost all Web browsers available today provide users with some bookmaking facility. Typically a bookmark is a record that holds the information like: the site address (i.e. URL), the site title (i.e. the title of the indexed page), and some other data such as bookmark creation date, last visit date and userprovided description of the indexed page. The bookmark set becomes a personal web space that helps the user in land-marking the huge information space composed of the currently available web pages. A major reason behind the popularity of bookmarks is their ease of use. In most browsers a simple click is enough to save the currently visited web page into the list of bookmarks. Later, another simple click on the saved bookmark takes the user directly to the required site. In order to enhance access time to saved bookmarks, most existing bookmarking tools allow users to organise their collections in a hierarchy of folders. While this may effectively enhance the access time, it introduces new problems: "users must continually trade-off the cost of organising their bookmarks and remembering which bookmark are in which folder versus the cost of having to deal with a disorganised set of bookmarks" <ref type="bibr" target="#b0">[1]</ref>. Finding the appropriate folder for a given bookmark is not an easy task. The same bookmark may fit in more than one folder. A bookmark may require creating a new folder, splitting existing ones, etc. <ref type="bibr" target="#b16">[17]</ref>. Currently, saving a bookmark in a given folder is not as easily supported, by current tools, as the creation of a bookmark. However, in this paper we make the assumption that users do organise their bookmarks in hierarchy of folders.</p><p>A user's bookmark collection can be a valuable information source for other users. Bookmarks are valuable for two main reasons. First of all, bookmarks are often the results of tedious and hard information searching process. If users can access others bookmark collections they can spare the required information searching effort. Lastly, because bookmarks are explicitly and intentionally added by the user, they give a precise evidence about the information interests of that user. By applying a collaborative filtering algorithm <ref type="bibr" target="#b20">[21]</ref>, communities of users that share the same interests can be identified. This can help to establish alternative information searching tools that are community-centred.</p><p>Recently, a number of academic and commercial systems have tackled the problem of building collaborative or shared bookmark repositories. Systems such as Groupfire (www.groupfire.com) and MyLynx (www.mylynx.com) allow users to save their bookmarks on a remote server. Users can select whether they wish to make some of their bookmarks public. The WebTagger system <ref type="bibr" target="#b12">[13]</ref> makes the bookmark pool sharable and searchable by a group of users. The GAB system can automatically merge different user's bookmark lists in a single and a seamless hierarchy <ref type="bibr" target="#b24">[25]</ref>. RAPP provides users with personalised help for bookmark classification and group-based bookmark recommendation service <ref type="bibr" target="#b4">[5]</ref>. Other systems allow to build and to identify communities of interest by analysing user's bookmark collections. Communities are manually defined in Pharos <ref type="bibr" target="#b2">[3]</ref>, semi-automatically in GroupMark <ref type="bibr" target="#b18">[19]</ref> and computationally in KnowledgePump <ref type="bibr" target="#b6">[7]</ref>.</p><p>Amazingly, almost all existing collaborative bookmarking tools seems to ignore major lessons learned in the last decade by the Computer Supported Collaborative Work (CSCW) <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b19">20]</ref>. In this paper we outline an original collaborative bookmarking system called COWING (for COllaborative Web IndexiNG), that enables an organised group of users to share their bookmarks, in an implicit, secure and an effective way. By implicit we mean that users are not required to do extra work in to sharing their bookmarks. The only additional work to do is to define other's access rights on their own repositories. A role-based access control service is provided in order to ease this task <ref type="bibr" target="#b22">[23]</ref>. Secure sharing refers to the capacity of each user to control who knows what about her/his own bookmark collections. Finally effectiveness is ensured by recommending users with relevant bookmarks that are computed by applying a distributed collaborative filtering algorithm. The proposed system is implemented as a multi-agent system. Each user is associated with a learning-assistant agent called a WING agent (for Web IndexiNG). A WING agent observes the user behaviour and learns how the user classified her/his own bookmarks. Each WING interacts with peer agents in order to identify communities of interests. Each community is centred on a local bookmark folder. Identified communities are then used to recommend the user with new bookmarks that are likely to interest her/him. When the user access a bookmark folder, recommended items relative to that folder are displayed. The user can then accept or reject some or all of delivered recommendations. Thus recommendation evaluation is made in an appropriate context rather than being intrusive. WING agents can apply different interaction protocols in order to share their knowledge and compute recommendations. In this paper we discuss the most basic interaction protocol that allow agents to exchange raw date only (i.e. bookmark folders)</p><p>The reminder of this paper is organised as follows. The COWING system is detailed in section 2. First a quick overview is given in section 2.1. Some notations are introduced in 2.2 then the three main services implemented in the systems are discussed: the access control service, yser's bookmark classification learning and recommendation computation service. Related work is briefly presented in section 3. Finally we conclude in section 4.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">The COWING System</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">System overview</head><p>The overall architecture of the COWING system is illustrated on figure <ref type="figure" target="#fig_0">1</ref>. The system is composed of a central COWING agent and a WING agent per registered user. The COWING agent acts as WING agents registry. It provides WINGS with each other addresses. In addition it provides WINGS with a description of the users organisation hierarchy (see section 2.3). Each user manages her/his own hierarchy of bookmarks just as in single-user settings. However, users are required to set access rules that define which personal bookmarks to share with whom. An easy to use rolebased access control service is provided for that purpose (see section 2.3). A WING agent observes the associated user behaviour in order to learn how the user organises her/his bookmarks. In this goal, each WING agent implements a hybrid incremental supervised Neural/CBR (Case-based Reasoning) classifier <ref type="bibr" target="#b17">[18]</ref> (see section 2.4). The used classifier learns user's organisation policy from both positive and negative examples. For each user u, the set of positive examples is composed of the bookmarks explicitly added by the user to a given folder or bookmarks recommended by the system and accepted by the user. Negative examples are bookmarks that are deleted, moved from one folder to another or rejected by the user after being recommended by the system.</p><p>Roughly, bookmark recommendations are computed as follows. Each WING agent asks peer agents to feed him with new bookmarks. When a WING B receives a request from a WING A, the former computes the view A has on its own repository. An agent view is composed of the set of bookmark folders and bookmarks for which the agent has the read access right. The agent B sends back to A bookmark folders that constitute A's view on B's repository. For each received folder f, A uses its classifier, switched to the classification mode, in order to classify bookmarks contained in f. If the majority of these bookmarks are classified in a same local folder f l then A recommends to add all bookmarks contained in f into f l . When the user consult the bookmark folder f l S/he can confirm or reject the agent proposition. Depending on the user decision (i.e. confirm or reject) recommended bookmarks will be treated either as positive or as negative examples.</p><p>Next, we introduce some notations that will be used in describing the functioning of the COWING System. Then we detail each of the three main services implemented in COWING: the access control service, the bookmark classifier and the bookmark recommendation mechanism.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Notations and work hypothesis</head><p>A bookmark b i described as a vector b i = &lt; A i , C i , L i &gt; where:</p><p>•À A i is the address (i.e. URL) of the document indexed by the bookmark. We choose to model an address by a couple A i = &lt;SA i , FP i &gt; where SA i is the server address on which the indexed document is located. FP i is the file path of that document on the server machine. Notice that we only consider here static HTML documents. •À C i is a vector composed of the k most significant words describing the content of the document indexed by the bookmark. k is a system parameter. •À L i is the list of hyperlinks embedded in the document indexed by the bookmark. We note L i ={l j }. Each link l j is described by a couple l j =&lt;anc j , dest j &gt; where anc j is the link anchor and dest j is the address of the destination document of that link.</p><p>Bookmarks are organised in hierarchy of folders. Each folder may contain a set of bookmarks and a set of sub-folders. A bookmark b i can belong to only one folder at one time (aliases and copies are not considered). This hypothesis is a restrictive one but it simplifies the implementation of the classifier system (section 2.3)</p><p>We note f u k the k th bookmark folder defined by user u. A bookmark folder f u k is defined as a couple f u k = &lt;B k , f u kf &gt; where B k is the set of bookmarks contained in the folder f u k , and f u kf is the identifier of the super folder of f u k . Information about bookmark and bookmark folders are obtained by continuously monitoring the user's bookmark file similarly to the procedure described in <ref type="bibr" target="#b3">[4]</ref>.</p><p>Bookmarks similarity. Given two bokmarks b i and b j. the function Sim(b i , b j ) measures the similarity between b i , b j.. This function takes as arguments the description of both bookmarks and returns a numeric value between 0 and 1. 1 for describing maximum similarity (i.e. identity) and 0 for denoting extreme dissimilarity. This similarity function is an aggregation of basic similarity functions defined on each of the bookmark attributes. Next we give similarity functions defined over the three bookmark attributes.</p><p>Address similarity. Given two addresses a and b, we define an address similarity function SimAdr as follows: Where the function h() returns the number of links between two nodes in the documents tree and MSCA() returns the most specific common ancestor of two nodes in a tree. This similarity measure is based on the hypothesis that two documents that are placed in the same directory on the same server are similar to each other. More the directory is deep in the server hierarchy more the documents are related to each other.</p><formula xml:id="formula_0">•À SimAdr (a,b) = 0 if a.SA ¡ b.SA /*</formula><p>Content similarity. Given two keyword vectors u and v we define a content similarity function SimCont as follows:</p><formula xml:id="formula_1">SimCont(u,v) = Card(u ¯ v) / Card (u ° v)I</formula><p>where card() is the cardinality function. A similar function is applied to measure embedded links similarity.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Access control service</head><p>Although privacy protection is a central issue in collaborative information systems <ref type="bibr" target="#b13">[14]</ref>, few existing systems provide an adequate protection model. For instance, existing collaborative bookmarking systems either do not provide a protection system, either implement a primitive protection policy where user's can distinguish between private and public data. These simple protection schemes mismatch collaboration requirements <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b11">12,</ref><ref type="bibr" target="#b19">20]</ref>. In real world settings users need to express fine grained access control rules. A user u i may wish to share a bookmark folder with some user u j but not with user u k . Moreover a user u i may wish to share with user u j a given bookmark folder f but not some specific bookmarks that are saved in f. Role-based access control models has been proposed in order to allow fine-grained, easy to use access control specifications <ref type="bibr" target="#b23">[24]</ref>. In COWING, we implement a modified version of the role-based access control model described in <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11]</ref>. The implemented model is described here after.</p><p>A role R i is an object that contains of a set of access rules. An access rule AR i is defined as a triple AR i = &lt; [+|-], o, a&gt;. The leading sign determines whether the right a granted over object o is positive or negative. Negative rights are introduced in order to ease access right specification <ref type="bibr">[27]</ref>. The object o can be a single bookmark b or a bookmark folder f. An access right a can be one of the following rights: read, and modify. The modification right implies the read one.</p><p>Two types of role objects can be distinguished:</p><p>•À Organisational role: These are roles that describe abstract positions in the user's community. For example, in a academic research group we can define the following abstract roles: researcher, student, Ph.D. candidate, Administrative assistant, Web master, librarian, etc. •À User roles: each user has her/his own user role. This describes access rules granted to the user.</p><p>The set of organisational roles form what we call the organisation model. A hierarchical structure is defined over the organisation model. This gives the organisation model a structure of a direct acyclic graph (DAG). The set of user's roles has a flat structure. Each user role object is linked to one or more organisational roles. Figure <ref type="figure">2</ref>.a illustrates an example of the relations between user roles and the organisation model. We call the whole set of roles (organisational and user roles) the extended organisation model. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>3DD</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4">Learning to classify</head><p>Each WING agent uses a hybrid neural/ case-based reasoning (CBR) classifier in order to learn the user's bookmark classification strategy <ref type="bibr" target="#b17">[18]</ref>. CBR is a problem solving methodology that is based on reusing past experiences in solving problems in order to solve new problems. A case is classically composed of two parts the problem part and the solution part. To solve a new problem the system retrieves from its memory (called also the case base) all cases that the problem part is similar to the problem to solve. Solutions proposed by retrieved cases can be adapted to propose a solution to the new problem. In our application, the problem part of a case is composed of set of the attributes of a bookmark (see section 2.2), the solution part is the folder identifier in which the bookmark is filed by the user.</p><p>The used classifier memory model, called PROBIS, is based on the integration of a prototype-based neural network and a flat memory devised into many groups, each of them is represented by a prototype. PROBIS contains two memory levels (see figure <ref type="figure" target="#fig_1">3</ref>), the first level contains prototypes and the second one contains examples. The first memory level is composed of the hidden layer of the prototype-based neural network.</p><p>A prototype is characterised by : 1.ÀThe prototype's co-ordinates in the m-dimensional space (each dimension corresponding to one parameter), these co-ordinates are the centre of the prototype. 2.ÀThe prototype's influence region, which is determined, by the region of the space containing all the examples represented by this prototype.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>3.ÀThe class to which belongs the prototype (i.e. a bookmark folder)</head><p>The second memory level is a simple flat memory in which examples are organised into different zones of similar examples. These two levels are linked together, so that a memory zone is associated with each prototype. The memory zone contains all examples belonging to this prototype. A special memory zone is reserved for atypical examples. These are examples that do not belong to any prototype.</p><p>The classifier system operates either in learning mode or in classification mode. The system can switch from one mode to another at any moment. Before the first learning phase, the system contains neither prototypes nor zones of examples. Examples for training are placed initially in the atypical zone. Prototypes and associated zones are then automatically constructed. An incremental prototype-based neural network is used to construct the upper memory level. Particular and isolated examples are kept in the atypical zone whereas typical examples are transferred to the relevant typical zones. This memory organisation helps to accelerate the classification task as well as to increase the system's generalisation capabilities. In addition adding a new example is a simple task, the example is added in the appropriate memory zone and the associated prototype is modified. The learning procedure is the following:</p><p>1.ÀIf the new example does not belong to any of the existing prototypes, a new prototype is created (this operation is called assimilation). This operation is accomplished by adding a new hidden unit to the neural network. The co-ordinates of this prototype and the radius of the influence region is initialised to a maximal value (this is a system parameter). A new memory zone is also created and linked to the prototype. The new example is added to the new memory zone. 2.ÀIf the new example belongs to a prototype whose class value is the same as the example, the example is added to the associated zone of the second level memory. The prototype co-ordinates are modified according to the Grossberg learning law |10] to fit better the new example (this operation is called accommodation). The vector representing the prototype co-ordinates and memorised in the weights of the links going from the input layer to this prototype is modified according:</p><formula xml:id="formula_2">W pro (t+1)= W pro (t)+g(t)*Sim (b i -W pro (t))</formula><p>where b i is the vector representing the bookmark to classify, g(t) is a decreasing series which tends to 0, and Sim is the bookmark similarity function. 3.ÀIf the new example belongs to a prototype whose class value is not the same as the example, the radius of this prototypes is decreased in order to exclude the new example of this prototype (this operation is called differentiation). The new example is introduced again to the neural network and the most similar prototype (if there is any) is activated again and one of the three previous conditions is right.</p><p>Build prototypes approximate the folders in the bookmark repository. Atypical examples correspond to bookmarks that can be classified in more than one folde.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.5">Learning to recommend</head><p>The bookmark recommendation computation is performed as follows. Each WING agent maintains locally two data structures: an agenda and a folder correlation matrix (FCM).</p><p>The agenda is a dictionary structure where keys represent identifiers of peer WING agents to contact and values are next contact dates. Hence Agenda <ref type="bibr">[i]</ref> gives the next contact date with agent i.</p><p>The FCM is a mXn matrix where m is the number of folders in the local repository and n the number of peer agents known to the local agent. An entry FCM[i, j] is a couple &lt;f j k ,cor ij &gt; where f j k is a folder identifier maintained by user u j and cor ij is the correlation degree between the folder f j k and the folder f i k maintained by local agent.</p><p>Correlation between two folders f 1 and f 2 is given by the number of bookmarks contained in folder f 2 that are classified in folder f 1 divided by the total number of bookmarks in f 2 . In the FCM matrix, an entry FCM[i,j]= &lt;f j k ,cor ij &gt; is computed by taking the folder f k from the agent j repository that have the maximum correlation value with folder i belonging to the local repository.</p><p>Given a WING agent A, the bookmark recommendation process is made by executing the following algorithm:  The function proceeds as follows. For each bookmark b i in f the local neural/CBR classifier is applied. For each bookmark, the classifier responds by the identifier of a local folder. The folder that has been selected the most will be the returned folder. Notice that the correlation relation is not symmetric since correlation is computed by using local classifiers (the classifier is different from one agent to another) and by using information contained in the local agent view on the repository of the other agent. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.6">Experimental results</head><p>In order to validate our approach we have applied the following experimentation protocol. We start by forming a synthetic collection of bookmarks. The total number of bookmarks is 300. These bookmarks are grouped in 3à folders. The mean number of bookmarks per folder is 10. Starting from this bookmark collection we randomly generated ten other collections by modifying each by up to 35%. Two types of operations are possible in order to modify a folder:</p><p>1.À delete a bookmark from the entire collection, 2.À move a bookmark to another folder.</p><p>Notice that we assume that a bookmark may not belongs to two different folders at the same time. The generated bookmark collections verify, by construction, this property. The modification percentage (i.e. 35%) ensures a suitable overlapping between the different collections of bookmarks. The system performances are evaluated by two criteria:</p><p>•À The learning ratio that measures for each classifier the precision of good classifications of examples belonging to the learning set (i.e. local bookmarks used to build the classifier) •À The generalisation ratio that measures the precision of recommending a bookmark o the right folder. The right folder of a bookmark is the original folder where the bookmark was in the initial collection.</p><p>A set of ten different experiences has been conducted. The average obtained learning ratio is 93,3% and the average generalisation ratio 86,2%. While these figures are encouraging, we should admit that these will not be the same is real world settings where overlapping ration among bookmark folders is far below the artificial overlapping threshold we have imposed in our experimental work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Related Work</head><p>Few systems are proposed in the literature to cope with the problem of collaborative bookmark management. Almost all-commercial systems are based on implementing a central shared URL repository that allows users to store and retrieve URLs. Some shared URL repositories, such as MyLynx.com allow user to define a private section and a public section.</p><p>Examples of shared bookmark systems are the GAB system <ref type="bibr" target="#b24">[25]</ref>, KnowledgePump <ref type="bibr" target="#b6">[7]</ref>, Pharos <ref type="bibr" target="#b2">[3]</ref>. The GAB system offers a service that allows merging different user bookmark repository in a virtual centralized bookmark. However no recommendation mechanism is implemented. It is up to the users to navigate in the merged repository to find bookmarks they are interested in. A comparable approach is also implemented in the PowerBookmarks systems <ref type="bibr" target="#b14">[15]</ref>. Both KnoweldgePump and Pharos provide users with the possibility to share a centralised bookmark repository. The repository hierarchy is defined by a system administrator. Both systems provide also customisation service in order to recommend users with bookmarks that are more interesting for them in given folder. Recommendation computation is made by applying a collaborative filtering mechanism that is base on matching the characteristics of bookmarks added and accessed by each user.</p><p>Most similar to our work is the RAAP system <ref type="bibr" target="#b4">[5]</ref>. In RAAP the system also learns by using a classical classifier how users classify bookmarks and use this information to recommend people with new bookmarks. However, RAAP has the disadvantage of being built on a centralised repository. It provides a poor access control model. Related also to our work is the Yenta system <ref type="bibr" target="#b5">[6]</ref>. Yenta is presented by its authors as a matchmaking system. It aims at discovering matchmaking between people based on comparing shared interests. The principal of Yenta could be easily applied to built a collaborative bookmark system. The accent is put on distributing the computation of the matchmaking function.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4.ÀConclusion</head><p>In this paper we have presented CoWing: a multi-agent collaborative bookmark management system. The COWING system addresses mainly the resources discovery problem. It provides a mean that allow users to share their bookmarks, in a personalised way without asking users to do extra task except for defining others access control on their own repositories. Each user is assisted by a personal agent, the CoWing agent that uses a hybrid neural/CBR classifier that learns the user strategy in classifying bookmarks. The learned classification strategy is used to construct associations between bookmark folders belonging to other users.</p><p>Experiments made on synthetic data show that our approach is valid. However, we believe that some enhancements should in order to make the system operational in real work settings. One important issue concerns the cold start problem <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b24">25]</ref>. The applied recommendation computation approach makes the hypothesis that users have organised their bookmarks in a hierarchy of folders. Each folder has some semantic sense. While lot of users do use hierarchical bookmark structures, some still using flat organisation structures <ref type="bibr" target="#b1">[2]</ref>. Another related problem is the witnessed low overlapping between different user bookmark repositories <ref type="bibr" target="#b3">[4]</ref>. We are working on proposing solutions to these two problems. Future work concerns also the extension of the system to handle the two other problems of bookmark maintenance and organisation.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. The COWING system architecture involving three users: A, B and C.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. The memory is composed of two levels: prototypes and stored examples</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 4</head><label>4</label><figDesc>Figure 4  illustrates the interaction protocol between two Wing agents. The function computeCorrelation (line 7 in above algorithm) finds the folder i in the local repository that have the highest correlation value with a folder f as defined above. The function proceeds as follows. For each bookmark b i in f the local neural/CBR classifier is applied. For each bookmark, the classifier responds by the identifier of a local folder. The folder that has been selected the most will be the returned folder. Notice that the correlation relation is not symmetric since correlation is computed by using local classifiers (the classifier is different from one agent to another) and by using information contained in the local agent view on the repository of the other agent.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Interaction protocol between WING agents</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>This graph is constructed by climbing up links that relate the user role A to the organisation model. Figure2.b illustrates the AC/DAG of the WING agent associated with the user named Maria. All folders in B's repository for which A has at least the read right are added to the computed view. The general idea of the evaluation algorithm is to evaluate A's read right in terms of access rules contained in A's AC/DAG. Starting by A's user role, if no explicit answer, rejection of confirmation, is obtained then the evaluation function consider rules contained in next role in the AC/DAG graph. The graph is explored in a depth first way. This exploration rule is necessary to avoid ambiguity in evaluating the access rule. More details about the access control model can be found in<ref type="bibr" target="#b9">[10]</ref>.</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell cols="2">GqxsesyxÀwyhiv</cell></row><row><cell></cell><cell>Qhix</cell><cell></cell><cell cols="2">Riegri</cell></row><row><cell>ÈeÉ</cell><cell cols="2">Hr6ÀQhix EeiÀQhix</cell><cell>3svse</cell><cell>Eesx</cell></row><row><cell></cell><cell></cell><cell></cell><cell>5ve</cell><cell>V</cell></row><row><cell></cell><cell>Eese</cell><cell>Prih</cell><cell cols="2">Gvsse</cell></row><row><cell></cell><cell>Hr6ÀQhix</cell><cell>Qhix</cell><cell></cell></row><row><cell></cell><cell>Eese</cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>3DD</cell></row><row><cell></cell><cell>3svse</cell><cell>Riegri</cell><cell></cell></row></table><note>Fig. 2. The access control model componentsThe organisation model is defined and administrated by the application administrator. Each Wing agent holds a copy of the extended organisation model. All WING agents share the same structure however, access rules associated with each role (user or organisational one) differ from one WING to another. When agent B needs to compute agent A view on its local repository, it constructs what we call A's access right DAG (noted AC/DAG).</note></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Information Archiving with Bookmarks: Personal Web space Construction and Organization</title>
		<author>
			<persName><forename type="first">À</forename><forename type="middle">D</forename><surname>Abrams</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Baecker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Chignell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of ACM Conference on Human Computer Interactions (CHI&apos;98)</title>
				<meeting>ACM Conference on Human Computer Interactions (CHI&apos;98)<address><addrLine>Los Anglos</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1998-04">1998. April</date>
			<biblScope unit="page" from="41" to="48" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">Human Factors of Personal Web Information Spaces</title>
		<author>
			<persName><forename type="first">D</forename><surname>Abrams</surname></persName>
		</author>
		<ptr target="http://www.dgp.torento.edu/~abrams" />
		<imprint>
			<date type="published" when="1997">1997. 1997</date>
		</imprint>
		<respStmt>
			<orgName>Department of Computer Sciences, University of Toronto</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">MS Thesis</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Pharos, a Collaborative Infrastructure for Web Knowledge Sharing</title>
		<author>
			<persName><forename type="first">V</forename><surname>Bouthors</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Dedieu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the third European Conference On Research and Advanced Technology for Digital Libraries (ECDL&apos;99</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Abiteboul</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Vercoustre</surname></persName>
		</editor>
		<meeting>the third European Conference On Research and Advanced Technology for Digital Libraries (ECDL&apos;99<address><addrLine>Paris</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1999-09">1999. September, 1999</date>
			<biblScope unit="page" from="215" to="233" />
		</imprint>
	</monogr>
	<note>LNCS No 1696</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">What Do Web Users Do? An Empirical Analysis of Web Use</title>
		<author>
			<persName><forename type="first">À</forename><forename type="middle">A</forename><surname>Cockburn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Mckenzie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal on Human-Computer Studies</title>
		<imprint>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Intelligent Collaborative Information Retrieval</title>
		<author>
			<persName><forename type="first">À</forename><forename type="middle">J</forename><surname>Delgado</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Ishii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ura</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">proceedings of Progress in Artificial Intelligence, IBERAMIA&apos;98</title>
				<meeting>Progress in Artificial Intelligence, IBERAMIA&apos;98</meeting>
		<imprint>
			<biblScope unit="volume">1484</biblScope>
			<biblScope unit="page" from="170" to="182" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Political Artifacts and Personal Privacy: The Yenta Multi-Agent Distributed Matchmaking System</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">N</forename><surname>Foner</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999-06">1999. June 1999</date>
		</imprint>
		<respStmt>
			<orgName>Massachusetts Institute of Technology</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Ph.D. Thesis</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Making Recommender Systems Work for Organizations</title>
		<author>
			<persName><forename type="first">N</forename><surname>Glance</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Arregui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dardenne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of PAAM&apos;99</title>
				<meeting>PAAM&apos;99<address><addrLine>London</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1999-04">1999. April 1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Competitive learning: From interaction activation to adaptive resonance</title>
		<author>
			<persName><forename type="first">À</forename><forename type="middle">S</forename><surname>Grossberg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cognitive Science</title>
		<imprint>
			<biblScope unit="page" from="23" to="63" />
			<date type="published" when="1987">1987</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Groupware and Social Dynamics: Eight challenges for developers</title>
		<author>
			<persName><forename type="first">J</forename><surname>À Grudin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communication of the ACM</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="92" to="105" />
			<date type="published" when="1994-01">1994. January 1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Groupware: Control and Architectural issues</title>
		<author>
			<persName><forename type="first">À</forename><forename type="middle">R</forename><surname>Kanawati</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1997-11">November 1997</date>
			<biblScope unit="page">172</biblScope>
		</imprint>
		<respStmt>
			<orgName>Institut National Polytechnique de Grenoble</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Ph.D. Thesis</note>
	<note>In French</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">COLT: Yet Another Integrated Collaborative Environment</title>
		<author>
			<persName><forename type="first">R</forename><surname>Kanawati</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the third International Conference on the Design of Cooperative Systems</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Dareses</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Zaraté</surname></persName>
		</editor>
		<meeting>the third International Conference on the Design of Cooperative Systems</meeting>
		<imprint>
			<date type="published" when="1998-05-29">1998. -29 May 1998</date>
			<biblScope unit="volume">II</biblScope>
			<biblScope unit="page" from="99" to="102" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Informing the design of shared bookmark systems</title>
		<author>
			<persName><forename type="first">À</forename><forename type="middle">R</forename><surname>Kanawati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Malek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">proceedings of RIAO&apos;2000</title>
				<meeting>RIAO&apos;2000<address><addrLine>Paris</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">A Bookmaking Service for Organizing and Sharing URLs</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>Keller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">R</forename><surname>Wolf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Rabinowitz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Mathe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">proceedings of the 6 th International Conference on the World Wide Web</title>
				<meeting>the 6 th International Conference on the World Wide Web<address><addrLine>Santa Clara, CA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1997-04">April 1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Privacy Interfaces for Information Management</title>
		<author>
			<persName><forename type="first">À</forename><forename type="middle">T</forename><surname>Lau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Etzioni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">S</forename><surname>Weld</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="88" to="94" />
			<date type="published" when="1999-04">April 1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">PowerBookmarks: A system for Personalizable Web Information Organization, Sharing and Management</title>
		<author>
			<persName><forename type="first">À</forename><forename type="middle">W S</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Vu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Hara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Takano</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">proceedings of the 8 th International World Wide Web Conference (WWW&apos;8)</title>
				<meeting>the 8 th International World Wide Web Conference (WWW&apos;8)<address><addrLine>Toronto, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1999-05">May 1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Using Cool-lists to Index HTML Documents in the Web</title>
		<author>
			<persName><forename type="first">J-G</forename><surname>Lim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2 nd International Conference on the World Wide Web (WWW&apos;2)</title>
				<meeting>the 2 nd International Conference on the World Wide Web (WWW&apos;2)<address><addrLine>Chicago, IL</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1994">1994. 1994</date>
			<biblScope unit="page" from="831" to="938" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Automatically Organizing Bookmarks per Contents</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">S</forename><surname>Maarek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">Z</forename><surname>Ben Shaul</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 5 th International World Wide Web Conference</title>
				<meeting>the 5 th International World Wide Web Conference<address><addrLine>Paris</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1996-05">1996. May</date>
			<biblScope unit="page" from="6" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Hybrid approaches Integrating Neural Networks and case based reasoning: from Loosely Coupled to Tightly Coupled Models</title>
		<author>
			<persName><forename type="first">À</forename><forename type="middle">M</forename><surname>Malek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Soft Computing in Case-based Reasoning</title>
				<editor>
			<persName><forename type="first">K</forename><forename type="middle">P</forename><surname>Sankar</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><forename type="middle">D</forename><surname>Tharam</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><forename type="middle">Y</forename><surname>Daniel</surname></persName>
		</editor>
		<imprint>
			<publisher>Spinger</publisher>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="73" to="94" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Organizing and Sharing Information on the World-Wide Web using a Multi-agent System</title>
		<author>
			<persName><forename type="first">N</forename><surname>À Mathe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Chen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">proceedings of ED-MEDIA&apos;98 Conference on Educational Multimedia and Hypermedia</title>
				<meeting>ED-MEDIA&apos;98 Conference on Educational Multimedia and Hypermedia<address><addrLine>Freiburg, Germany</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1998-06">1998. June 1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Why CSCW Applications Fail: Problems in the Adoption of Interdependent Work Tools</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Markus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Connolly</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Computer Supported Collaborative Work (CSCW&apos;90)</title>
				<meeting>the International Conference on Computer Supported Collaborative Work (CSCW&apos;90)<address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1990">1990. 1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Recommender Systems</title>
		<author>
			<persName><forename type="first">P</forename><surname>Resnick</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="1997">1997. 1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Siteseer: Personalized Navigation for the Web</title>
		<author>
			<persName><forename type="first">J</forename><surname>Rucker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marcos</forename><forename type="middle">J P</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="73" to="75" />
			<date type="published" when="1997">1997. 1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Role-Based Access Control Models</title>
		<author>
			<persName><forename type="first">À</forename><forename type="middle">R</forename><surname>Sandhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Coyne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Feinstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Youman</surname></persName>
		</author>
		<ptr target="http://citeseer.nj.nec.com/sandhu96rolebased.html" />
	</analytic>
	<monogr>
		<title level="j">IEEE Computer</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="38" to="47" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Access Control for Collaborative Environments</title>
		<author>
			<persName><forename type="first">À</forename><forename type="middle">H</forename><surname>Shen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dewan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">proceedings of the ACM Conference on Computer-Supported Cooperative Work</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Turner</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Kraut</surname></persName>
		</editor>
		<meeting>the ACM Conference on Computer-Supported Cooperative Work<address><addrLine>Torento, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1992">1992</date>
			<biblScope unit="page" from="51" to="58" />
		</imprint>
	</monogr>
	<note>CSCW&apos;92)</note>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Group Asynchronous browsing on the World Wide Web</title>
		<author>
			<persName><forename type="first">K</forename><surname>Wittenburg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Das</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Hill</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Stead</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">proceedings of the 6 th International Conference on the World Wide Web (WWW&apos;6)</title>
				<meeting>the 6 th International Conference on the World Wide Web (WWW&apos;6)</meeting>
		<imprint>
			<date type="published" when="1997">1997. 1997</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
