<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Carlos A. Iglesias</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mercedes Garijo</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jose I. Fernandez-Villamor</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jose J. Duran</string-name>
        </contrib>
      </contrib-group>
      <fpage>57</fpage>
      <lpage>68</lpage>
      <abstract>
        <p>Agreement Patterns have been de ned for improving communication in software and services development, as well as for providing a practitioner oriented approach for reusing existing agreement technologies. This article presents the notion of agreement patterns, their structure and some of the rst identi ed examples.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        One of the envisioned aspects of Future Internet is the Internet of Services,
which is conceived as [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] an open service delivery platform, which goes beyond
the client-server model of service delivery.
      </p>
      <p>
        In an Internet of Services with a vast and changing landscape of service
providers and consumers, the ful llment of agreements for services is a key issue,
which involves notions such as trust, coordination or organization. These notions
are the basis for the understanding and implementation of arti cial social
systems [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], and have largely addressed in elds such as multi-agent systems [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3,4,5</xref>
        ],
p2p computing [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], service computing [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">7,8,9</xref>
        ], autonomic computing [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], social
psychology [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], sociobiology or social neuroscience.
      </p>
      <p>
        Agreement technologies [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] (AT) is a recent discipline which collects this
multidisciplinary research and can be de ned as the technologies for the practical
application of knowledge to the automated ful llment of agreements. Agreement
technologies do not dictate the underlying technologies (objects, components,
agents, services, ...), but are focused on the formalization of knowledge
structures, protocols, algorithms and expertise that contribute to the establishing of
agreements in an open dynamic environment.
      </p>
      <p>Nevertheless, there has not been de ned yet a common vocabulary or patterns
for sharing and reusing previous experiences in the application of agreements
to social-inspired software integration. This article pretends to bridge the gap
through the use of software patterns for agreement analysys and reuse, which
are called agreement patterns.</p>
      <p>The rest of the article is organized as follows. Section 2 reviews some of the
related work in patterns in the SOA and multi-agent community. Then, section 3
presents a classi cation scheme for agreement patterns. Section 4 introduces
some examples of identi ed agreement patterns. Finally, section 5 draws out the
conclusions of this research work and the future work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background and Related Work</title>
      <p>
        Software design patterns [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] can be de ned as \a technique for achieving widespread
reuse of software architecture. They capture the static and dynamic structures
and collaborations of components in successful solutions to problems that arise
when building software in domains like business data processing,
telecommunications, graphical user interfaces, databases and distributed communication
software. Patterns aid the development of reusable components and frameworks by
expressing the structure and collaboration of participants in a software
architecture at a level higher than source code or object-oriented design models.".
      </p>
      <p>
        Patterns can be represented in an informal way using natural language, UML,
pattern languages or ontologies [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. The informal representation of software
patterns usually follows the canonical (or so-called Alexandrian) form [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], which
identi ed the following elements:
{ Name: a meaningful name that provides a vocabulary for discussing.
{ Alias: an alternative name to the pattern.
{ Problem: a statement of the problem and the goals it wants to reach.
{ Context: the preconditions under which the problem and its solution seem
to recur.
{ Forces: a description of the relevant forces and constraints and how they
interact with one another and with the goals. Considerations to be taken
into account to select a solution for a problem.
{ Solution: static relationships and dynamic rules describing how to realized
the desired outcome.
{ Examples: one or more sample applications of the pattern which illustrate
its application. Known occurrences of the pattern which help in verifying
that the pattern is a proven solution to a recurring problem.
{ Resulting context: the state or con guration of the system after the
pattern has been applied.
{ Rationale: a justi cation of the pattern, explaining how and why it works,
and why it is \good".
{ Related patterns: compatible patterns which can be combined with the
described pattern.
      </p>
      <p>Based on this previous research, Agreement patterns are de ned as
software patterns that facilite software components coordination through the ful
llment of agreements. Agreements patterns include all kind of agreements, both
explicit ones (e.g. negotiation) and tacit ones (e.g. organization).</p>
      <p>There are related works for de ning design patterns in the areas of
multiagent systems and Service Oriented Computing (SOC).</p>
      <p>
        Agent-Oriented Patterns have been de ned for sharing multi-agent system
development experiences. Oluyomi [
        <xref ref-type="bibr" rid="ref16 ref17">16,17</xref>
        ] presents an agent pattern classi
cation scheme based on two dimensions: stages of the agent-oriented software
development and tasks in each stage of development. At each stage or level of
development (analysis, multi-agent architecture, agent architecture, multi-agent
implementation), the framework identi es the attributes of that level of
abstraction, in order to classify these patterns. In addition, Oluyomi proposes to re ne
the canonical pattern form for de ning an Agent-Oriented Pattern Template
Structure, which adds more granularity depending on the pattern type (agent
internal architecture structural, interactional or strategic patterns, etc.). Some
of the patterns identi ed by Oluyomi, whose classi cation scheme includes other
approaches, can be considered agreement patterns. The main di erences between
her classi cation and the one proposed in this article is that Oluyomi's classi
cation is agent oriented (agent oriented development phase, agent architecture,
etc.), while the one proposed here is independent of the technology to be used,
although implementation examples can be presented with di erent technologies.
In addition, agreements are not a key concept in Oluyomi's classi cation scheme
as in our proposal. Future work will provide a mapping of the agreement related
patterns classi ed by Oluyomi onto our classi cation scheme.
      </p>
      <p>
        In the area of Service Oriented Architecture (SOA), SOA patterns have been
de ned [
        <xref ref-type="bibr" rid="ref18 ref19 ref20">18,19,20</xref>
        ]. For example, Erl [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] classi es patterns for architecturing
services, service compositions, service inventories and service oriented enterprise.
Rotem-Gal-Oz [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] describes patterns for Message Exchange, Service Interaction,
Service Composition, Structural, Security and Management. SOA patterns [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]
provide high level architectural patterns, which do not detail yet agreement
issues.
      </p>
      <p>
        Inside the SOC community, the GRAAP Working Group (Grid Resource
Allocation and Agreement Protocol WG) has de ned the speci cation Web Services
Agreement [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], which is particularly interesting for this research. The purpose
of the speci cation is the de nition of a Web Services protocol for
establishing agreements de ned in XML. The speci cation covers the speci cation of
agreement schemas, agreement template schemas and a set of port types and
operations for managing the agreement life cycle. This speci cation de nes an
agreement as an agreement between a service consumer and a service provider
speci es one or more service level objectives both as expressions of requirements
of the service consumer and assurances by the service provider on the
availability of resources and/or service qualities. An agreement de nes a
dynamicallyestablished and dynamically-managed relationship between parties. The object of
this relationship is the delivery of a service by one of the parties within the
context of the agreement. The management of this delivery is achieved by agreeing
on the respective roles, rights and obligations of the parties. An agreement is
characterized by its name, context and terms.
      </p>
      <p>
        The OASIS Reference Architecture for SOA [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] is an abstract realization of
SOA, focusing on the elements and their relationships needed to enable
SOAbased systems to be used, realized and owned. The reference architecture de nes
three primary viewpoints: business via services that captures what SOA means
for people using it to conduct business, realizing service oriented architectures
deals with the requirements for constructing a SOA; and owning service oriented
architectures addresses issues involved in owning and managing a SOA. The
notion of agreement is included in several ways in the architecture, as an
organizational concept (constitution) or as a formalization of a relationship (business
agreement and contract).
      </p>
      <p>These two initiatives,OASIS RA and WS-Agreement are compatible and
complementary of our proposal, since they provide a modeling reference
architecture as well as a language for describing the identi ed patterns boiling
down to the implementation level. This integration will be included in future
publications.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Classi cation Scheme for Agreement Patterns</title>
      <p>The purpose of this section is an early identi cation of a multi-dimensional
classi cation scheme for agreement patterns ( gure 1) which makes easier for
software developers to select the right pattern to apply, as well as the basis for
its cataloging.</p>
      <p>The identi ed dimensions characterize an agreement from several properties
of the agreement itself, such as topic (purpose of the agreement), duration, and
phase (also so-called state in WS-Agreement); the organizational environment
where the agreement takes place, and the decision making cognitive task of the
agreement stakeholders.</p>
      <p>One pattern can have more than one value for each one of the dimensions,
and can be classi ed only to the relevant dimensions.</p>
      <p>
        The dimensions of the classi cation scheme are:
{ Duration: if the agreement is reached for a short or long term. The duration
of the agreement has organizational implications, as well as its properties.
Pechoucek [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] distinguishes between alliances for long-term collaboration
agreements and coalitions for short-term collaboration agreements. In a
similar way, other authors such as Camarinha [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] identi es long term strategic
alliances and goal-oriented networks, based on this dimension.
{ Topic: the goal of the agreement can be [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], among others, the obtention
of goods, the usage of goods or services, the provision of a service or the
de nition of social rules.
{ Phase: this dimension de nes the agreement phase where the pattern can be
applied. The phases considered are provider selection, agreement ful llment,
agreement renegotiation, agreement monitoring and agreement conclusion.
Provider selection consists of the selection of the best available provider
before establishing an agreement, which can be based on trust and
reputation techniques and can involve interactions such as bidding or contract net
protocol (CNP) [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. Agreement negotiation is the process of de ning
establishing the conditions of the agreement, respecting the normative context
and using negotiation techniques such as argumentation. Agreement
enactment is the commitments of the agreement are e ective. For example, in the
call-by-agreement interaction method [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], once the agreement for action is
establish, then the actual enactment of the action is requested. In the CNP,
the successful bidders are informed that they are now contractors for a task
together with this task speci cation. Agreement renegotiation is the phase
of changing the conditions of a previously negotiated agreement, because of
reasons such as environmental changes, expiration of the agreement or the
coming up of a renewal option. Agreement monitoring is the process of
reviewing the established agreement conditions while the agreement is being
enacted. In the area of service computing, it is usually referred as Service
Level Agreement monitoring. Finally, Agreement conclusion is the process of
concluding an agreement by any party, which can be because the agreement
is not being enacted according to the negotiated terms, or because one or
more parties desires to conclude it.
{ Normative context: the normative context [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] determines the rules of the
game, such as interaction patterns, norms and organization structures.
{ Decision making: this dimension collects cognitive patterns followed by
the parties of the agreement. Some of the main subcategories are trust and
reputation [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], group decision [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], organizational change [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], reasoning
about the impact of the organization evolution in the current negotiated
agreements and in the agreement procedures; normative reasoning [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] for
interpreting the normative context for a speci c case; agreement change,
reasoning about the improvement of the negotiated agreements as well as its
interpretation in speci c situations.
      </p>
      <p>The dimensions are interrelated, and one value in one dimension can
constraint the values of other dimensions. For example, the topic (goods acquisition)
can restrict the valid values of normative context, being interaction (bidding,
contract-net protocol, ...) or organizational structure (electronic institution, ...).
4</p>
    </sec>
    <sec id="sec-4">
      <title>Examples</title>
      <p>
        This section provides examples of some of the rst identi ed agreement patterns,
whose pattern structure follows the canonical form extended with the classi
cation scheme de ned in section 3. The decision making process is shown in a
reasoning diagram which follows CommonKads notation [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] as illustrated in 2.
Selection of the most satisfactory service providers for a speci c service demand
is known as the Service Selection problem [
        <xref ref-type="bibr" rid="ref28 ref29">28,29</xref>
        ].
      </p>
      <p>
        This pattern collects the pattern of rating available service providers in order
to select the one with highest rating. Rating-based mechanisms are simple and
e ective [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ], if consumers have similar preferences.
      </p>
      <sec id="sec-4-1">
        <title>Name ProviderRating</title>
        <p>Duration Short term (speci c project)
Phase Provider Selection
Decision making Reputation, Trust
Problem Choosing a service provider, having access to other users' rating.
Context Public rating of services.</p>
        <p>
          Forces A comparison of the experience-based service-selection techniques can
be found in [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ].
        </p>
        <p>
          Solution Service provider selection is based on the rating given to service
providers using reputation [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ] or trust [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ] techniques.
        </p>
        <p>Fig. 3. Provider Rating Reasoning Diagram</p>
      </sec>
      <sec id="sec-4-2">
        <title>Examples E-Commerce [33] Resulting context An agreement is ful lled.</title>
        <p>Related Patterns Portability
4.2</p>
        <p>Portability Pattern
This pattern collect the problematic of changing of provider without service
interruption, which involves monitoring the current QoS and the estimation of
other Service Provider o er. When the decision of changing is taking, this
pattern involves the negotiation of breaking the existing contract and agree a new
contract with the new provider.</p>
        <p>Usually, service providers try to prevent this portability, de ning some
customer retention policy to improve customer loyalty.</p>
        <p>
          Name Portability
Alias Service switching [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ]
Problem A potentially better service o er is available and the customer wants
to break the service provision agreement with the current service provider
and to establish a new agreement with a new provider, without disruption
of the service.
        </p>
        <p>Context There are several available service providers that o er a better service
conditions than the current provider.
Forces This pattern is applicable when there are more than one stakeholder in
the development of the new service, and the consumer do not have strong
penalties or commitments with the current provider.</p>
        <p>Solution Based on the QoS evaluation of the current service provider, the
estimation of the QoS of the available service providers, and the consumer
policies and commitments, the decision to change of provider is taken, which
involves requesting portability (breaking the current agreement with the
service provider and establishing an agreement with the new provider).
Examples This pattern is frequently found in several domains. For example,
it is a common pattern in telephony customers or mobile network
environments.</p>
        <p>Resulting context The consequences of the portability can be penalties due
to commitments with the initial service provider, and the new commitment
with the new service provider.</p>
        <p>
          Duration Short term (speci c project)
Topic Service Provision
Phase Agreement conclusion, Provider selection, Agreement negotiation
Decision making Agreement change
Related Patterns {
Known uses Wireless networks [
          <xref ref-type="bibr" rid="ref35">35</xref>
          ], professional services [
          <xref ref-type="bibr" rid="ref36">36</xref>
          ]
The context and resulting context of this pattern can be easily formalized as
preconditions and postconditions as follows. Let be d a decisor, pc the current
provider, pi the available provider i, and the relation provider(decisor, provider)
used for representing that decisor has an agreement in e ect with the provider.
        </p>
        <p>Let be Uid the utility function of a decisor d for a provider i.</p>
        <p>In order to be applied this pattern, the following pre and postconditions
should be ful lled.</p>
        <p>Preconditions 8&lt; p:rporvoivdiedre(rd(;dc;)i) 8^i; i 6= c
: 9i ; Uid Ucd j i 6= c
^</p>
        <p>
          Postconditions provider(d; i) ^ :provider(d; c)
Resulting context the intermediary acts on behalf of the user based on an
agreement between user and intermediary. This pattern re nes the service
mediator entity de ned within SOA-RM [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>Related Patterns Portability. Portability could be a decision of the
intermediary.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions and Future work</title>
      <p>This article presents preliminary results of the research on de ning a software
methodology for agreement technology. The task is challenging, since agreement
technology is an emerging area.</p>
      <p>The research has been based on the following premises:
{ Applicability. The results of agreement technologies should be applied by any
software component which requires to ful ll an agreement. In particular, we
have not restricted the applicability to the agent community.
{ Simplicity. Agile methodologies have shown their potential for tting in every
day task. In particular, design patterns and refactoring have succeed in its
adoption. The results of our approach try to be easy to adopt.
{ Reuse. In order to provide technology transfer from agreement technologies
to other areas, it is needed to organize and provide facilities for the
comprehension of the research results. Patterns provide a suitable mechanism for
this technology transfer and a principled way.</p>
      <p>The main conclusions of our research is that agreement patterns can be a
useful concept for providing a unifying vocabulary in agreement technology, and
providing a catalogue of methods for its implementation.</p>
      <p>In this article we have proposed a rst structure and some examples of
application with some agreement patterns we have identi ed. Nevertheless, these
are initial results, and we are now working on a more de nitive structure of the
patterns, as long as its formalization and operationalization.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgements</title>
      <p>This research has been partly funded by the Spanish Ministry of Science and
Innovation through the projects Ingenio Consolider2010 AT Agreement
Technologies (CSD2007-0022)) and T2C2 (TIN2008-06739-C04-03/TSI) as well as
the Spanish Ministry of Industry, Tourism and Trade through the project
RESULTA (TSI-020301-2009-31).</p>
      <p>We would like to express our gratitude to Sascha Ossowski and Alberto
Fernandez for involving us in the project AT as well as the rest of the URJC
research group for their support within the project. We would like also to thank
the rest of research groups of AT, IIIA CSIC and UPV for their comments, and
specially to Vicente Botti and Vicente Julian for their support, motivation and
patience along the project.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. Working Group on Future Internet Infrastructure FP7 ICT Advisory Group:
          <article-title>Future internet infrastructure</article-title>
          .
          <source>Technical Report version 8</source>
          , FP7 ICT Advisory Group (
          <year>January 2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Sierra</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Botti</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ossowski</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Agreement technologies</article-title>
          . Available at http://www.agreement-technologies.
          <source>org</source>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Jennings</surname>
            ,
            <given-names>N.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faratin</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norman</surname>
            , T.J.,
            <given-names>O</given-names>
          </string-name>
          <string-name>
            <surname>'Brien</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wiegand</surname>
            ,
            <given-names>M.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voudouris</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alty</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miah</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mamdani</surname>
            ,
            <given-names>E.H.</given-names>
          </string-name>
          :
          <article-title>ADEPT: Managing business processes using intelligent agents</article-title>
          .
          <source>In: Proceedings of the 16th Annual Conference of the British Computer Society Specialist Group on Expert Systems (ISIP Track)</source>
          , Cambridge, UK (
          <year>1996</year>
          )
          <volume>5</volume>
          {
          <fpage>23</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Huhns</surname>
            ,
            <given-names>M.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burstein</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Decker</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Durfee</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gasser</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goradia</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jennings</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lakkaraju</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nakashima</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parunak</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosenschein</surname>
            ,
            <given-names>J.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruvinsky</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sukthankar</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Swarup</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sycara</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tambe</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wagner</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zavala</surname>
          </string-name>
          , L.:
          <article-title>Research directions for service-oriented multiagent systems</article-title>
          .
          <source>IEEE Internet Computing</source>
          <volume>9</volume>
          (
          <issue>6</issue>
          ) (
          <year>2005</year>
          )
          <volume>65</volume>
          {
          <fpage>70</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Lomuscio</surname>
            ,
            <given-names>A.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wooldridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jennings</surname>
            ,
            <given-names>N.R.:</given-names>
          </string-name>
          <article-title>A classi cation scheme for negotiation in electronic commerce</article-title>
          .
          <source>Lecture Notes in Computer Science</source>
          <year>1991</year>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Greco</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Scarcello</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>On the complexity of computing peer agreements for consistent query answering in peer-to-peer data integration systems</article-title>
          .
          <source>In: CIKM '05: Proceedings of the 14th ACM international conference on Information and knowledge management</source>
          , New York, NY, USA, ACM (
          <year>2005</year>
          )
          <volume>36</volume>
          {
          <fpage>43</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Papazoglou</surname>
            ,
            <given-names>M.P.</given-names>
          </string-name>
          :
          <article-title>Service -oriented computing: Concepts, characteristics and directions</article-title>
          .
          <source>Web Information Systems Engineering</source>
          , International Conference on
          <volume>0</volume>
          (
          <year>2003</year>
          )
          <fpage>3</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Andrieux</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Czajkowski</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Keahey</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ludwig</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nakata</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pruyne</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rofrano</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tuecke</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Web services agreement speci cation (WS-Agreement)</article-title>
          .
          <source>Technical report</source>
          , Grid Resource Allocation Agreement Protocol (GRAAP) Working Group (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>McCabe</surname>
            ,
            <given-names>F.G.</given-names>
          </string-name>
          :
          <article-title>Reference architecture for service oriented architecture</article-title>
          .
          <source>Technical report, OASIS (April</source>
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Parashar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hariri</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          : Autonomic Computing. CRC Press, Inc.,
          <string-name>
            <surname>Boca</surname>
            <given-names>Raton</given-names>
          </string-name>
          , FL, USA (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Carnevale</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          : Psychology of Agreement. Psychology Press (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Jennings</surname>
          </string-name>
          , N.:
          <article-title>Agreement technologies</article-title>
          .
          <source>Intelligent Agent Technology</source>
          , IEEE / WIC / ACM International Conference on
          <volume>0</volume>
          (
          <year>2005</year>
          )
          <fpage>17</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Schmidt</surname>
            ,
            <given-names>D.C.</given-names>
          </string-name>
          :
          <article-title>Using design patterns to develop reusable object-oriented communication software</article-title>
          .
          <source>Communications of the ACM</source>
          <volume>38</volume>
          (
          <issue>10</issue>
          ) (
          <year>1995</year>
          )
          <volume>65</volume>
          {
          <fpage>74</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Rosengard</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ursu</surname>
            ,
            <given-names>M.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>marc Rosengard</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ursu</surname>
            ,
            <given-names>M.F.</given-names>
          </string-name>
          :
          <article-title>Ontological representations of software patterns</article-title>
          .
          <source>In: Proc. KES'04, Lecture Notes in Computer Science</source>
          , Springer Verlag (
          <year>2004</year>
          )
          <volume>31</volume>
          {
          <fpage>38</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Buschmann</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meunier</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rohnert</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sommerlad</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stal</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Patternoriented software architecture: a system of patterns</article-title>
          . John Wiley &amp; Sons, Inc. (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Oluyomi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karunasekera</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sterling</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>A comprehensive view of agentoriented patterns</article-title>
          .
          <source>Autonomous Agents and Multi-Agent Systems 15(3)</source>
          (
          <year>2007</year>
          )
          <volume>337</volume>
          {
          <fpage>377</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Oluyomi</surname>
            ,
            <given-names>A.O.</given-names>
          </string-name>
          :
          <article-title>Patterns and Protocols for Agent-Oriented Software Development</article-title>
          .
          <source>PhD thesis</source>
          , Faculty of Engineering. University of Melbourne, Australia.
          <source>(November 01</source>
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Erl</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>SOA Design Patterns</article-title>
          . Prentice-Hall (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Rotem Gal Oz</surname>
            ,
            <given-names>A.: SOA</given-names>
          </string-name>
          <string-name>
            <surname>Patterns. Manning</surname>
          </string-name>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Zdun</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hentrich</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aalst</surname>
            ,
            <given-names>W.M.P.V.D.:</given-names>
          </string-name>
          <article-title>A survey of patterns for service oriented architectures</article-title>
          .
          <source>Int. J. Internet Protoc. Technol</source>
          .
          <volume>1</volume>
          (
          <issue>3</issue>
          ) (
          <year>2006</year>
          )
          <volume>132</volume>
          {
          <fpage>143</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Pechoucek</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mar</surname>
            <given-names>k</given-names>
          </string-name>
          , Barta,
          <string-name>
            <surname>J.:</surname>
          </string-name>
          <article-title>A knowledge-based approach to coalition formation</article-title>
          .
          <source>IEEE Intelligent Systems</source>
          <volume>17</volume>
          (
          <issue>3</issue>
          ) (
          <year>2002</year>
          )
          <volume>17</volume>
          {
          <fpage>25</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Camarinha-Matos</surname>
            ,
            <given-names>L.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Afsarmanesh</surname>
          </string-name>
          , H.:
          <article-title>Collaborative networks. value creation in a knowledge society</article-title>
          .
          <source>In: Proceedings of PROLAMAT'06</source>
          , Shanghai, China (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>R.G.</given-names>
          </string-name>
          :
          <article-title>The contract net protocol: High-level communication and control in a distributed problem solver</article-title>
          . Transactions on Computers C-
          <volume>29</volume>
          (
          <issue>12</issue>
          ) (
          <year>1980</year>
          )
          <volume>1104</volume>
          {
          <fpage>1113</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Ossowski</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Coordination in multiagent systems { towards a technology of agreement</article-title>
          .
          <source>In: MATES-2008</source>
          . Volume
          <volume>5244</volume>
          ., Springer Verlag, Springer Verlag (
          <year>2008</year>
          )
          <volume>2</volume>
          {
          <fpage>12</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Mui</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks</article-title>
          .
          <source>PhD thesis</source>
          , MIT (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Kersten</surname>
          </string-name>
          , G.:
          <article-title>Support for group decisions and negotiations. an overview</article-title>
          . In Climaco, J., ed.:
          <source>Multicriteria Analysis</source>
          , Springer Verlag (
          <year>1997</year>
          )
          <volume>332</volume>
          {
          <fpage>346</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Schreiber</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Akkermans</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Anjewierden</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dehoog</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shadbolt</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vandevelde</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wielinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Knowledge Engineering and Management: The CommonKADS Methodology</article-title>
          . The MIT Press (
          <year>December 1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Maximilien</surname>
            ,
            <given-names>E.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>M.P.:</given-names>
          </string-name>
          <article-title>A framework and ontology for dynamic web services selection</article-title>
          .
          <source>IEEE Internet Computing</source>
          <volume>8</volume>
          (
          <issue>5</issue>
          ) (
          <year>2004</year>
          )
          <volume>84</volume>
          {
          <fpage>93</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Sensoy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <string-name>
            <given-names>A Flexible</given-names>
            <surname>Approach For Context-Aware Service Selection In AgentMediated</surname>
          </string-name>
          E-Commerce.
          <source>PhD thesis</source>
          , Bogazici University (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Sensoy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yolum</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>On choosing an e cient service selection mechanism in dynamic environments</article-title>
          .
          <source>In: Proceedings of the 9th International Workshop on Agent-Mediated Electronic Commerce (AMEC IX)</source>
          ,
          <year>2007</year>
          . Volume
          <volume>13</volume>
          . (
          <year>2007</year>
          )
          <volume>105</volume>
          {
          <fpage>118</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Sensoy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yolum</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>A comparative study of reasoning techniques for service selection</article-title>
          .
          <source>In: Proceedings of the 5th International Workshop on Agents and Peerto-Peer Computing (AP2PC'06)</source>
          . Volume
          <volume>123</volume>
          {
          <fpage>134</fpage>
          . (
          <year>2006</year>
          )
          <volume>91</volume>
          {
          <fpage>102</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Billhardt</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hermoso</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ossowski</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Centeno</surname>
          </string-name>
          , R.:
          <article-title>Trust-based service provider selection in open environments</article-title>
          .
          <source>In: SAC '07: Proceedings of the 2007 ACM symposium on Applied computing</source>
          , New York, NY, USA, ACM (
          <year>2007</year>
          )
          <volume>1375</volume>
          {
          <fpage>1380</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Sierra</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faratin</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jennings</surname>
            ,
            <given-names>N.R.:</given-names>
          </string-name>
          <article-title>A service-oriented negotiation model between autonomous agents</article-title>
          , Springer-Verlag (
          <year>1997</year>
          )
          <volume>17</volume>
          {
          <fpage>35</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Keaveney</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Customer switching behaviour in service industries: an exploratory study</article-title>
          .
          <source>Journal of Marketing</source>
          <volume>59</volume>
          (
          <year>1995</year>
          )
          <volume>71</volume>
          {
          <fpage>82</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>E.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faratin</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bauer</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wroclawski</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Automatic service selection in dynamic wireless network</article-title>
          .
          <source>Technical report</source>
          , First ACM International Workshop WMASH'
          <volume>03</volume>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Kugyte</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sliburyte</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>A standardized model of service provider selection criteria for di erent service types: a consumer oriented approach</article-title>
          . Engineering Economics.
          <source>Commerce of Engineering Decisions</source>
          <volume>43</volume>
          (
          <issue>3</issue>
          ) (
          <year>2005</year>
          )
          <volume>56</volume>
          {
          <fpage>63</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>C.C.</given-names>
          </string-name>
          :
          <article-title>A web-based consumer-oriented intelligent decision support system for personalized e-services</article-title>
          .
          <source>In: ICEC '04: Proceedings of the 6th international conference on Electronic commerce</source>
          , New York, NY, USA, ACM (
          <year>2004</year>
          )
          <volume>429</volume>
          {
          <fpage>437</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>