<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Semantic Service Discovery in MAS Using Social Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>E. del Val</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>M. Rebollo</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>V. Botti</string-name>
          <email>vbottig@dsic.upv.es</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Grupo de Tecnolog ́ıa Informa ́tica - Inteligencia Artificial Departamento de Sistemas Informa ́ticos y Computacio ́n Universidad Polite ́cnica de Valencia Camino de Vera</institution>
          <addr-line>S/N 46022 Valencia</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <fpage>23</fpage>
      <lpage>34</lpage>
      <abstract>
        <p>Service-Oriented Multi-Agent Systems are dynamic systems populated by heterogeneous agents. These agents model their functionality as services in order to allow heterogeneous agents or other entities to interact in a standardized way. Furthermore, due to the large-scale and the adaptive needs of the system, the traditional directory facilitators or middle-agents are not suitable for the management of the agents services. In this paper we present a distributed system where there is no a ce. The proposal provides a fully decentralized structure and allows agents to locate services using only local information. The system is enhanced using semantic information in the generation of the system structure and also in the search process.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Service-Oriented Multi-Agent Systems (SOMAS) can be described as open and
dynamic systems, where agents provide basic functionality through services and new
agents can enter to the system and existing ones leave. An important issue that has
raised great interest in the research community in the latest years is service
discovery. In open systems where there is a large number of agents and the available agents
change dynamically, finding the appropriate agent which offers the service required is
not an easy task. Conventional approaches to locate agents with certain functionality in
SOMAS, such as registries or middle-agents, are centralized approaches which are not
always appropriated for large-scale and highly dynamic environments. These proposals
present some weakness such as bottlenecks, complexity or the huge amount of
memory needed to keep all the information about the agent’s functionality when the system
scales. Distributed approaches, such as agent coalitions or federations of registries, have
been proposed to solve some of these problems but the required coordination effort to
create the coalitions and to maintain data consistency between distributed registries
makes these proposals not suitable for highly dynamic environments.</p>
      <p>
        An alternative for traditional proposals is the use of social networks[
        <xref ref-type="bibr" rid="ref25">25</xref>
        ][
        <xref ref-type="bibr" rid="ref28">28</xref>
        ].
Human beings create social structures in a decentralized way which allows to locate other
individual in a few steps considering only local information. This fact was observed by
Milgram in the well known experiment of ’six degrees of separation’[
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. The results
of this experiment arose two questions: how is the structure of these social networks
and how an effective search of individuals is carried on only with local information. In
the wake of this experiment, several works started to pay attention on the analysis of
the underlying structures in human societies and the properties of these structures.
      </p>
      <p>As a result of that, several models based on mathematical functions have been
proposed to simulate the structure in real social networks. These models try to reflect how
social links are established between individuals to form a network which can guide
the search. These networks such as small-world or preferential attachment network,
are called navigable social networks and it can be ensured that short paths between
two random individuals can be found using only local information. How an effective
search is carried on only with local information is the other important aspect. Which
criteria should be follow by the individuals in order to guide the search towards the
target? This depends on the structure of the network. There are some strategies that have
better results depending of the underlying structure where it is applied. For instance
in small-world networks similarity or geographical distance can be considered a good
parameters to consider while strategies guided by degree are not so suitable.</p>
      <p>
        In this work, we propose the use of a social network model as the underlying
structure of a service discovery system for agents. The structure relies on a social feature
present in many social networks called homophily[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Homophily expresses the idea
that similar people interact with higher frequency than dissimilar people. Therefore, in
our system agents with similar roles and services have more probability to be linked.
The system provides a fully decentralized structure and allows agents to locate services
using only local information. The system is enhanced using semantic information in the
generation of the system structure and also in the search process.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        Open and dynamic environments where the scalability and the workload are low make
use of middleagents to facilitate service discovery [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ][
        <xref ref-type="bibr" rid="ref22">22</xref>
        ][
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. The matchmakers could
provide an optimal matching due to they consider all the registered services in the
system. Unfortunately, this kind of agents could be a bottleneck when the workload
increases. Other drawbacks are their complexity, the huge amount of memory needed to
keep service advertisements and the cost of service composition as the number of
services grows significantly. Different approaches have been suggested to overcome the
above mentioned problems. Peer-to-peer approaches [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ][
        <xref ref-type="bibr" rid="ref2">2</xref>
        ][
        <xref ref-type="bibr" rid="ref20">20</xref>
        ][
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] broadcast a query
using local knowledge The drawback of this approach to service discovery is that the
communication among agents is essential and the overall communication traffic
overhead may be large. Another distributed way to locate distributed services is to form
coalitions or clusters[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ][
        <xref ref-type="bibr" rid="ref18">18</xref>
        ][
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Nevertheless, the choice of what coalitions are going
to be formed is a difficult task. This entails recursively to calculate the values of the
coalitions and later selecting the coalition with the best result. A third way for agents
to discover services in efficiently is the distribution of the middleagents or facilitators
[
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. These proposals suggest to split the function of the service facilitator
among a group of agents. The system designer assigns a local matchmaker to each host
or segment of the system, which provides matchmaking services to agents in its vicinity
(its segment). In systems with very large segments the problems of scalability are only
marginally relieved by this approach because the large segments become overloaded
systems which have local bottlenecks. Another case in which this approach is not
useful is in systems with many cross-links between segments. In this case the overhead of
coordinating tasks among local matchmakers might be greater than the benefit obtained
from their distribution.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Proposed System and Definitions</title>
      <p>The proposal that we present here tries to overcome drawbacks of current discovery
approaches in open SOMAS through a completely distributed approach, considering
semantic information about organizational roles and services. This approach is based
on social networks as underlying structure. The advantages and contributions of this
proposal compared to others are:
– System which integrates services and agents. Agents have social and proactive
capabilities which provide more flexibility and adaptability to the system. Services
facilitate the reusability and interoperability. Here, agents functionality is described
in terms of services, therefore we obtain the advantages of both technologies.
– System structure that guarantees, in general, that a service if it exits is going to be
found in a bounded number of steps.
– Service discovery strategy that only needs local information to navigate the network
in order to reach the required service.
– The use of semantic information to create the system structure and to lead the
service search.</p>
      <p>– Inclusion of organizational information in the service discovery process.
DEFINITION 1 (Agent-Service Discovery System). An SDS is defined as SDS = (A,
L), where A is the set of agents that are part of the SDS (nodes): A= fa1,...,ang,
and each edge `=(ai, aj )2L indicates the existence of a knowledge or communication
relationship between agent ai and aj in the system (undirected links).</p>
      <p>Agents are social entities which have local knowledge about its immediate
neighbors, including their identity, degree, organizational information and the semantic
description of the services they offer, but it is unaware of the rest of the agents present in
the system.</p>
      <p>DEFINITION 2 (Agent). An agent ai=(R,N ) jai 2 A is a social entity which can play
several roles in different organizational units R=fr1,. . . ,rng:jRj &gt; 0, has a
neighborhood N =fak,...,angj ak 2 N , 9 (ai,ak)2L, jN j &gt; 0.</p>
      <p>The agent role determines the kind of services an agent offers. The role provides an
abstract layer over the services that the agent offers and it is used to create the structure
of the system. Roles are defined inside an organization unit ou. The organization unit
establishes a set of policies responsible of the structure of the system. These policies
are related to basic system operations (join, leave, discover. . . ).
DEFINITION 3 (Role). A role in our system is defined as r = ( ,S,ou) 2 R where is
a semantic concept for the role, ou is the organization where the agent plays the role r
and S=fs1,. . . sng is the set of services offered by the agent.</p>
      <p>Each service si is a semantic service defined by the tuple: si = (I,O), where I
denotes the set of inputs and O denotes the set of outputs. The I and O of the service
are semantic concepts defined in a common ontology. To simplify the system, we are
going to consider that each agent plays one role and offers one service.</p>
      <p>
        The agent-service discovery system that we present relies on a property present in
many real social networks: homophily. This word expresses the idea that similar people
tend to interact and establish links with higher probability than dissimilar people. There
are two types of homophily[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]:
– choice homophily, where patterns of interaction are driven by preferences for
similarity. This kind of homophily has two forms: status homophily, where the
individuals are considered similiar if they share a cultural background, and value
homophily, where individuals are considered similar on the basis of shared values,
attitudes, and believes.
– induced homophily, emerges not from individual choice, but from influence
dynamics that make individuals more similar over time[
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>
        In this work we focus on choice homophily and its two forms. In general, homophily
has demonstrated that is one of the most pronounced features in social networks[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ][
        <xref ref-type="bibr" rid="ref27">27</xref>
        ].
Due to the efficiency of the social networks with this feature, we consider important to
consider this property in our system.
      </p>
      <p>DEFINITION 4 (Agent homophily). In our SDS the homophily between two agents is
based on the status homophily and the value homophily:
– value homophily (Hv(Si,Sj )) is defined over the agent’s services and it is
considered as the semantic similarity between the services offered by the agents.
– status homophily (Hs(ri,rj )) is defined over the agent’s role and it is considered as
the semantic similarity between the roles played by the agents
Therefore, the homophily between two agents is defined as the linear combination of
value and status homophily:</p>
      <p>Hs(ri; rj ) = role match(ri: ; rj : )</p>
      <p>H =</p>
      <p>Hv + (1
)</p>
      <p>Hs</p>
      <p>We are going to describe with more detail how are calculated each kind of
homophily. The homophily function Hs(ri,rj ), means the degree of match dom (exact,
subsumes, plug-in, fail) between the semantic concept of the roles played by the agents.
(1)
(2)
where role match is the function which calculates the semantic similarity between
ri: i and rj : j . The homophily function Hv(ri.S,rj .S), means the degree of match
between the services offered by the agents.
I =
[ s:I; O =</p>
      <p>[ s:O</p>
      <p>8s2r:S
match(Ii; Ij ) = max(WG0=(Ii[Ij;E0))
where function match solves a bipartite matching problem between semantic
services. In our case we have two bipartite graphs, one where the vertexes are the inputs
of the services and the other where the vertexes are the outputs. In the case of matching
between the inputs of the services (the process is the same for the outputs), the
bipartite graph G=(Ii[Ij , E) has a set of vertexes with Ii inputs and the other set with
Ij inputs. Given a bipartite graph for the service inputs, G=(Ii[Ij ,E), its matching
G0=(Ii[Ij ,E0) E0 E is a graph where all the vertexes of one set are connected with
the other set of vertexes only with one edge. In this graph, we allow that edges share a
vertex to give more flexibility to the matching. The sum of weights (WG0 ) of the edges
in the matching is maximized:</p>
      <p>WG0=(Ii[Ij;E0) =</p>
      <p>X</p>
      <p>!k
8ek2E0
max(jIij; jIj j)
(3)
(4)
(5)
(6)
4
4.1</p>
      <sec id="sec-3-1">
        <title>Join</title>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>System Operations</title>
      <p>
        The process that an agent should follow to get into the SDS is as following (see Alg. 1):
the agent ai tries to establish a set of connections with other agents already present in
the system. The number of connections that the agent is going to establish is generated
by a random function which follows an exponential distribution. The idea is to generate
a system with an exponential degree distribution to achieve the structure of a
preferential attachment network[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. A preferential attachment network it is characterized by a
degree distribution which follows a power-law degree distribution, p(dg) / dg , where
p(dg) indicates the probability to be connected to a node with degree dg. This means
that there are some nodes have a high degree and the majority has a low degree. This
structure ensures that the diameter of the network is ln jAj, where jAj is the number of
agents in the SDS and in some situations, when 2&lt; &lt;3, is lnln jAj[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. This model is
present in many ’online communities’ such as WWW, electronic mail or citation graphs
[
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. These networks are the result of a growth process in which new nodes that join
the system prefer to be connected to well connected nodes.
      </p>
      <p>Once the agent knows the number of connections, it should decide which agents
are going to be its neighbors. The probability of an agent ai to establish a connection
with agent aj is directly proportional to the homophily degree between the agents, if
the agents are more similar, they have more probability to be connected. This
condition allows a new agent not only to establish ’short connections’ between agents with
similar roles and semantic services, but also between agents that are not similar (’long
connections’). The idea of ’long connections’ is to create short paths between groups
of agents that do not offer similar services and reduce the number of hops needed to
discover services. The probability to establish a connection between two agents in the
system is based on the homophily degree between them H(ai,aj ).</p>
      <p>Algorithm 1 Join, where a is the new agent and SD the system
function Join(a, SD)
connections ExpRandom( )
connected F alse
dg 0
while :connected ^ dg connections do
ar random(SD)
if H(a; ar) UniRandom(0,1) then
`(a,ar)
a:dg a:dg+1
updateNeighbors(a; ar)
connected T rue
end if
end while
end function
4.2</p>
      <sec id="sec-4-1">
        <title>Leave</title>
        <p>When an agent leave the system could be for three reasons: the agent decide voluntary to
leave the system, failure or ’sabotage’. Periodically an agent sends a keep alive message
to its neighbors. The agent will notice that one of its links is broken whether after
sending a message, the time to receive an answer from the neighbor expires. In that
case, the agent deletes the neighbor from its neighbor list and establishes a new link
with other agent in the network to keep their degree (see Alg. 2 and Alg. 3).
Algorithm 2 Leave, where a is the agent and SD the system
function Leave(a, SD)
local
for ai 2 a.N do
removeLink(a, ai)
newLink(ai,SD)
end for
end function
4.3</p>
      </sec>
      <sec id="sec-4-2">
        <title>Search</title>
        <p>DEFINITION 5 (Service discovery problem) Given a set of agents A situated in a SDS=
(A,L), the service discovery problem is defined as a probabilistic decision-making task
in which an agent ai2 A is looking for an agent aj 2 A, which offers the required
service st.
Algorithm 3 newLink, where a is the agent and SD the system
function Link(a, SD)
connected F alse
while :connected do
ar random(SD)
if sim(a; ar) UniRandom(0; 1) then
`(a,ar)
ar:dg ar:dg+1
updateNeighbors(a; ar)
connected T rue
end if
end while
end function</p>
        <p>
          The search process in the system is based only on the agent local knowledge. When
the agent ai is looking for an agent aj which offers the required service st, ai selects
which of its neighbors is the most appropriated to redirect the query instead of broadcast
the query to all the neighborhood. In many networks which reflects power-law
characteristics, the search is suggested to be based on degree. However, this makes that highly
connected nodes could be overloaded with requests. Our selection criteria is based on
previous proposals presented in [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ][
          <xref ref-type="bibr" rid="ref30">30</xref>
          ], where the selection of the most promising
neighbor is based on two criteria: degree and the similarity. In our sytem the selection
criteria is based on the agent degree and the semantic similarity between agents services
and roles. Until the target agent aj is found, all future agents involve in the discovery
process will make their decision similarly (see Alg. 4).
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5 Simulation Results</title>
      <p>The test can be divided in two groups. The first group compares the performance of
typical distributed search strategies (degree, similarity, random) to the proposal presented
in this paper. The second test evaluates the fault tolerance of the SDS when
relationships between agents in the system are broken randomly (an agent leaves the system)
or following some patterns (which corresponds to deliberate failures ’sabotage’).
5.1</p>
      <sec id="sec-5-1">
        <title>System Characterization</title>
        <p>The experiments have been done in a set of networks that simulate the SDS structure.
These networks are preferential attachment networks and have generated as the result
of the join operation of agents. We have implemented two kind of networks: A where
the agents have not roles and Network B where each agent plays a role. We consider
10 types of different roles. Each network is composed of 1000 agents with one
semantic service each one. The services and roles have been assigned to the agents using a
uniform distribution.
5.2</p>
      </sec>
      <sec id="sec-5-2">
        <title>Performance</title>
        <p>In this section we evaluate the search operation in our SDS. Due to the similarities of
our system and p2p systems, we compared the search operation to other typical search
strategies used in p2p systems: random, degree, similarity, similarity and degree. We
have analysed the behavior of each strategy in 5000 searches in networks A and B.</p>
        <p>In figures 1a and 1b, the results obtained after the service search process are
presented. We see that in general the strategies in a network with organizational
information have a better performance than the same strategies in a network without this
information. That shows that organizational information in the system can guide the search
process better than the systems that only provide information related to the degree and
services. Between all the strategies, the search operation that we present in this paper
has a better performance than the others. This is because it considers, apart form the
degree and semantic service information, the roles that agents play. This information
reduces the set of possible agents suitable to offer the service.</p>
        <p>An important parameter to consider in SDS is the number of steps to reach the
target agent. Figure 2a shows the mean path length obtained with each strategy in networks
with role information (B). In general, all the strategies return paths with more steps as
the number of agents in the network grows. When the size of the network is over 700
agents, the path length does not increase significantly. This shows that the structure of
the SDS is suitable for large-scale systems.</p>
        <p>In Figure 2b the success rate of each search strategy in SDS is depicted. An obvious
result is that as the system scale increases, the percentage successful searches decreases.
The search operation presented here is the algorithm less influenced by the number of
agents in the system. In general, the search operation in the 80% of searches finds a
path between the source agent to the target agent.
5.3</p>
      </sec>
      <sec id="sec-5-3">
        <title>Fault Tolerance</title>
        <p>The last and very important check is the behavior of the SDS under failures. The
problem appears when a broken link splits the system into two isolated parts, since some
SSeeaarrcchhooppeerEartaEiotiVnonN
ESVimNilarity&amp;DeEegggrVrerNeee
Degree
Similarrieittyey-Based
SDimeilga
SSDimiemgirillaeaerriittyy-Based
Random-Based
0 0
cssccseueuaehSS
r
lf
%
100
90
80
70
60
50
40
30
15 0
40 50 60
Path Length When Successful
(b)
500
n agents
(b)</p>
        <p>SearcShearochpoepEerEratVioionNn
SimilSaimriiltayrit-yBbased</p>
        <p>Degree
DeDgergere-eb-aBsaesded
RRaannddRoaomnmdom-Based
Search opeEraEtioVnN
Similarity&amp;DEegVreNe
Degree-Based
Similarity-Based
Random-Based
10
20
30</p>
        <p>40 50 60
Path Length When Successful
agents will no longer be reachable. To analyse it, agent failures have been modelled as
a failure of all its connexions. When some links are broken, an alternative path has to
be found. For random failures (see Fig.3a and Fig.3b), it can be observed that when
the number of deleted agents is from 10% to 30%, the path length increases, due to
there are alternative paths (with more steps) to find the agent with the required service.
When the number of deleted agents ranges from 30% to 50%, the network is divided in
several isolated parts. Only the searches inside the isle will success, so the number of
successful searches decreases and the path length decreases because the isle diameter
are smaller.</p>
        <p>42
40
38
th 36
g
n
e
L
tah 34
naP
eM 32
30
28
2610</p>
        <p>Search opeErEatVioNn
Similarity&amp;DegErVeeN
Degree-Based
Similarity-Based
Random-Based
Search opeErEaVtioNn
Similarity&amp;DegErVeeN</p>
        <p>Degree-Based
Similarity-Based</p>
        <p>Random-Based
70
60
50</p>
        <p>An interesting case is what happens when a deliberate failure is provoked. In the
case of systems that follow a power-law, the worst case occurs when agents with
highest degree (hubs) are disconnected. Figure 4a and 4b shows how ’sabotage’ affects the
performance of the search process. In this case, the path length increases due to only
a few highly connected hubs have been deleted and an alternative path exists. The
performance attending the number of successful searches decreases considerably as the
number of deleted hub increases.
6</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>The aim of this work is to provide an alternative to traditional approaches that deal
with the service discovery task in large-scale open SOMAS. Our proposal tries to
overcome drawbacks present in other centralized (bottlenecks, complexity, huge amount of
memory needed, global knowledge) and distributed (network traffic, congestion,
coordination effort, data consistency between distributed registries, update data) discovery
approaches. We consider that structures used in social networks facilitate the task of
locating agent services in a few steps using only local information. For that reason we
investigate the use of social networks as underlying structure of a service discovery
system. This structure is based on the concept of similarity between individuals,
considering organization role and services, and uses semantics to calculate this similarity.
Furthermore, we provide several operations for the agents to be part of the system. An
evaluation of the search functionality compared to other traditional p2p strategies is also
80
70
provided. The behavior of the system under failure and ’sabotage’ circumstances have
been also evaluated. The results of the experiments show that the system is robust under
failure and that the search functionality performs well.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgment</title>
      <p>This work is supported by TIN2009-13839-C03-01 and TIN2008-04446 projects,
CONSOLIDER-INGENIO 2010 under grant CSD2007-00022, FPU grant
AP-200800601 awarded to E. del Val.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Barabasi</surname>
            ,
            <given-names>A. L.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Albert</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <article-title>Emergence of Scaling in Random Networks</article-title>
          .
          <source>Science</source>
          ,
          <volume>286</volume>
          (
          <issue>5439</issue>
          ):
          <fpage>509</fpage>
          -
          <lpage>512</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>E.</given-names>
            <surname>Bircher</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Braun</surname>
          </string-name>
          .
          <article-title>An Agent-Based Architecture for Service Discovery and Negotiation in Wireless Networks</article-title>
          .
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Basit</given-names>
            <surname>Chaudhry</surname>
          </string-name>
          , Chris Marton, and
          <string-name>
            <given-names>Hana</given-names>
            <surname>Shepherd</surname>
          </string-name>
          .
          <article-title>Homophily and structure in multiplex networks</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Miller</surname>
          </string-name>
          , Lynn, and
          <string-name>
            <surname>James</surname>
            <given-names>M.</given-names>
          </string-name>
          <article-title>Birds of a feather: Homophily in social networks</article-title>
          .
          <source>Annual Review of Sociology</source>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>M.</given-names>
            <surname>Moore</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Suda</surname>
          </string-name>
          .
          <article-title>A decentralized and self-organizing discovery mechanism</article-title>
          .
          <source>In Proc. Of the First Annual Symposium on Autonomous Intelligent Networks and Systems</source>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Jeffrey</given-names>
            <surname>Travers</surname>
          </string-name>
          and
          <string-name>
            <given-names>Stanley</given-names>
            <surname>Milgram</surname>
          </string-name>
          .
          <article-title>An experimental study of the small world problem</article-title>
          .
          <source>Sociometry</source>
          ,
          <year>1969</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Yamini</given-names>
            <surname>Upadrashta</surname>
          </string-name>
          , Julita Vassileva, and
          <string-name>
            <given-names>Winfried</given-names>
            <surname>Grassmann</surname>
          </string-name>
          .
          <article-title>Social networks in peer-topeer systems. paper presented at the</article-title>
          .
          <source>In 38th Hawaii International Conference on System Sciences</source>
          , pages
          <fpage>3</fpage>
          -
          <lpage>6</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Alexei</given-names>
            <surname>Va</surname>
          </string-name>
          <article-title>´zquez. Growing network with local rules: Preferential attachment, clustering hierarchy, and degree correlations</article-title>
          .
          <source>Physical Review E</source>
          ,
          <volume>67</volume>
          (
          <issue>5</issue>
          ), May
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Duncan</surname>
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Watts</surname>
            , Peter Sheridan Dodds, and
            <given-names>M. E. J.</given-names>
          </string-name>
          <string-name>
            <surname>Newman</surname>
          </string-name>
          .
          <article-title>Identity and search in social networks</article-title>
          .
          <source>Science</source>
          ,
          <volume>296</volume>
          :
          <fpage>1302</fpage>
          -
          <lpage>1305</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Hui</surname>
            <given-names>Zhang</given-names>
          </string-name>
          , Ashish Goel, and
          <string-name>
            <given-names>Ramesh</given-names>
            <surname>Govindan</surname>
          </string-name>
          .
          <article-title>Using the small-world model to improve freenet performance</article-title>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>R.</given-names>
            <surname>Cohen</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Havlin</surname>
          </string-name>
          .
          <article-title>Scale-Free Networks Are Ultrasmall</article-title>
          .
          <source>Physical Review Letters</source>
          ,
          <volume>90</volume>
          (
          <issue>5</issue>
          ),
          <year>February 2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>J.</given-names>
            <surname>Dang</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Hungs</surname>
          </string-name>
          .
          <article-title>Concurrent Multiple-Issue Negotiation for Internet-Based Services</article-title>
          . Number Vol.
          <volume>10</volume>
          -
          <fpage>6</fpage>
          .
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. S. Jha,
          <string-name>
            <given-names>P.</given-names>
            <surname>Chalasani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Shehory</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Sycara</surname>
          </string-name>
          .
          <article-title>A formal treatment of distributed matchmaking</article-title>
          .
          <source>In Proc. of the 2nd Int. Conference on Autonomous Agents, number</source>
          Vol.
          <volume>3</volume>
          , pages
          <fpage>457</fpage>
          -
          <lpage>458</lpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>M. Klusch</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Fries</surname>
            , and
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Sycara</surname>
          </string-name>
          .
          <article-title>Automated semantic web service discovery with owlsmx</article-title>
          .
          <source>In AAMAS</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Miller</surname>
          </string-name>
          , Lynn, and
          <string-name>
            <surname>James</surname>
            <given-names>M.</given-names>
          </string-name>
          <article-title>Birds of a feather: Homophily in social networks</article-title>
          .
          <source>Annual Review of Sociology</source>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>M.</given-names>
            <surname>Moore</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Suda</surname>
          </string-name>
          .
          <article-title>A decentralized and self-organizing discovery mechanism</article-title>
          .
          <source>In Proc. Of the First Annual Symposium on Autonomous Intelligent Networks and Systems</source>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>S.</given-names>
            <surname>Mullender</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Vitanyi. Distributed</surname>
          </string-name>
          Match-Making. Number Vol.
          <volume>3</volume>
          .
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. E. Ogston and
          <string-name>
            <given-names>S.</given-names>
            <surname>Vassiliadis</surname>
          </string-name>
          .
          <article-title>Local distributed agent matchmaking</article-title>
          .
          <source>In Proceedings of the 9th International Conference on Cooperative Information Systems</source>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19. E. Ogston and
          <string-name>
            <given-names>S.</given-names>
            <surname>Vassiliadis</surname>
          </string-name>
          .
          <article-title>Matchmaking among minimal agents without a facilitator</article-title>
          .
          <source>In Proceedings of the 5th International Conference on Autonomous Agents</source>
          , pages
          <fpage>608</fpage>
          -
          <lpage>615</lpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>A.</given-names>
            <surname>Ouksel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Babad</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Tesch</surname>
          </string-name>
          .
          <article-title>Matchmaking software agents in b2b markets</article-title>
          .
          <source>In Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04)</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>K.</given-names>
            <surname>Sigdel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Bertels</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Pourebrahimi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Vassiliadis</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.S.</given-names>
            <surname>Shuai</surname>
          </string-name>
          .
          <article-title>A framework for adaptive matchmaking in distributed computing</article-title>
          .
          <source>In In proceeding of GRID Workshop</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>K.</given-names>
            <surname>Sycara</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Klusch</surname>
          </string-name>
          .
          <article-title>Brokering and matchmaking for coordination of agent societies: A survey</article-title>
          .
          <source>Coordination of Internet Agents: Models, Technologies and Applications</source>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Katia</surname>
            <given-names>Sycara</given-names>
          </string-name>
          , Matthias Klusch, Seth Widoff, and
          <string-name>
            <given-names>Jianguo</given-names>
            <surname>Lu</surname>
          </string-name>
          .
          <article-title>Dynamic service matchmaking among agents in open information environments</article-title>
          .
          <source>SIGMOD Record</source>
          ,
          <volume>28</volume>
          :
          <fpage>47</fpage>
          -
          <lpage>53</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <given-names>Jeffrey</given-names>
            <surname>Travers</surname>
          </string-name>
          and
          <string-name>
            <given-names>Stanley</given-names>
            <surname>Milgram</surname>
          </string-name>
          .
          <article-title>An experimental study of the small world problem</article-title>
          .
          <source>Sociometry</source>
          ,
          <year>1969</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Yamini</surname>
            <given-names>Upadrashta</given-names>
          </string-name>
          , Julita Vassileva, and
          <string-name>
            <given-names>Winfried</given-names>
            <surname>Grassmann</surname>
          </string-name>
          .
          <article-title>Social networks in peer-topeer systems. paper presented at the</article-title>
          .
          <source>In 38th Hawaii International Conference on System Sciences</source>
          , pages
          <fpage>3</fpage>
          -
          <lpage>6</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Alexei</surname>
          </string-name>
          <article-title>Va´zquez. Growing network with local rules: Preferential attachment, clustering hierarchy, and degree correlations</article-title>
          .
          <source>Physical Review E</source>
          ,
          <volume>67</volume>
          (
          <issue>5</issue>
          ), May
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Duncan J. Watts</surname>
            , Peter Sheridan Dodds, and
            <given-names>M. E. J.</given-names>
          </string-name>
          <string-name>
            <surname>Newman</surname>
          </string-name>
          .
          <article-title>Identity and search in social networks</article-title>
          .
          <source>Science</source>
          ,
          <volume>296</volume>
          :
          <fpage>1302</fpage>
          -
          <lpage>1305</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Hui</surname>
            <given-names>Zhang</given-names>
          </string-name>
          , Ashish Goel, and
          <string-name>
            <given-names>Ramesh</given-names>
            <surname>Govindan</surname>
          </string-name>
          .
          <article-title>Using the small-world model to improve freenet performance</article-title>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>M. McPherson</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Smith-Lovin</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Cook</surname>
          </string-name>
          .
          <article-title>Birds of a feather: Homophily in social networks</article-title>
          .
          <source>Annual Review of Sociology</source>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30. S¸
          <article-title>ims¸ek and Jensen. Navigating networks by using homophily and degree</article-title>
          .
          <source>NAS</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Antnio L. Lopes</surname>
          </string-name>
          and
          <string-name>
            <surname>Lus M. Botelho</surname>
          </string-name>
          .
          <article-title>Improving Multi-Agent Based Resource Coordination in Peer-to-Peer Networks</article-title>
          .
          <source>Journal of Network</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>