<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Some Thoughts about Commitment Protocols (Position Paper)</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Matteo Baldoni and Cristina Baroglio Universita` degli Studi di Torino Dipartimento di Informatica c.</institution>
          <addr-line>so Svizzera 185, I-10149 Torino</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>-From the seminal paper by Singh [1], commitments protocols have been raising a lot of attention. The key feature of commitment protocols is their declarative nature, which allows specifying them in a way which abstracts away from any reference to the actual behaviour of the agents. By doing so, commitment protocols respect the autonomy of agents. After more than ten years from the introduction of commitments, it is time to ask (i) if a “commitment to do something” is the only kind of regulative norm, that we need in order to give a social semantics to a physical action, and (ii) if they realize what they promised. In this position paper we discuss these points.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        Practical commitments lie at the level of regulative (or
preservative) norms that, in turn, impact on the agents’
behavior, creating social expectations, that should not be frustrated.
By a practical commitment, in fact, an actor (debtor) is
committed towards another actor (creditor) to bring about
something [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], i.e. to act either directly or by persuading
others so as to make a condition of interest become true. Due
to their social nature, practical commitments are a powerful
tool that helps to overcome the controversial assumptions of
the mentalistic approach that mental states are verifiable and
that agents are sincere. Moreover, they support an
observational semantics for communication that allows verifying an
agent’s compliance with its commitments based on observable
behavior.
      </p>
      <p>
        From the seminal paper by Singh [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], commitments
protocols have been raising a lot of attention, see for instance
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The key feature of
commitment protocols is their declarative nature, which allows
specifying them in a way which abstracts away from any
reference to the actual behaviour of the agents, thus avoiding
to impose useless execution constraints [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. By doing so,
commitment-based protocols respect the autonomy of agents
because whatever action they decide to perform is fine as
long as they accomplished their commitments, satisfying each
others’ expectations. Now, after more than ten years from
the introduction of commitments, it is time to ask (i) if a
“commitment to do something” is the only kind of regulative
norm, that we need in order to give a social semantics to a
physical action, and (ii) if they realize what they promised.
To this aim, we think that there are four intertwined aspects
to be considered (see Figure 1):
1) Agent Coordination: how to account for coordination
patterns?
2) Infrastructure for Execution: which is the reference
execution infrastructure?
3) Observability of Events: are events really observable by
all agents?
4) Composition of Coordination Patterns: is composition
influenced by the previous aspects?
      </p>
    </sec>
    <sec id="sec-2">
      <title>II. AGENT COORDINATION</title>
      <p>
        Commitment protocols leave the choice of which action
to execute and when, totally up to the single agents. From
a more general perspective, they do not impose constraints
on the possible evolutions of the social state. However, in
many practical cases there is the need to capture regulative
aspects of agent coordination. For instance, a customer and
a merchant may agree that payment should be done before
shipping but how to represent this socially agreed constraint in
commitment protocols? When a similar coordination is desired
by the parties, one feels the lack of the means for capturing
them as regulations inside the protocol. Notice that the desired
coordination patterns, though restricting the choices up to the
agents, would not prevent flexibility because, for instance, it is
not mandatory that payment and shipping are one next to the
other. What matters is their relative order. More importantly, an
agreed coordination pattern establishes the boundaries within
which each party can exercise his/her own autonomy without
compromising the aims for which the agreement was taken.
Citing Dwight Eisenhower (State of the Union Address, Feb.
2, 1953) “To be true to ones own freedom is, in essence,
to honor and respect the freedom of all others.” As long as
agents respect such constraints, they are free to customize the
execution at their will, e.g. by interleaving the two actions with
others (like sending a receipt or asking a quote for another
item). This need is felt by the research community, see [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]
for an overview.
      </p>
      <p>
        When regulations are expressed, agents can individually
check whether their behavior conforms to the specification
[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. But in order to guarantee to the others that one will act in
a way that conforms to the regulation, an agent should formally
bind its behavior to the regulation itself. The proposal in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ],
for instance, allows the representation of temporal regulations
imposed on the evolution of the social state, however, it does
not supply a deontic semantics to the constraints. Therefore the
agents’ behavior is not formally bound to them. On the other
hand, the REGULA framework [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] uses precedence logic to
express temporal patterns that can be used as antecedent (or
consequent) conditions inside commitments. Since patterns
may involve various parties, the framework also introduces
a notion of condition control and of commitment safety, in
order to allow agents to reason about the advisability of taking
a commitment. However, patterns are not generally expressed
on the evolution of the social state but are limited to events.
      </p>
    </sec>
    <sec id="sec-3">
      <title>III. INFRASTRUCTURE FOR EXECUTION AND</title>
      <p>OBSERVABILITY OF EVENTS</p>
      <p>
        Commitments were introduced to support run-time
verification in contrast to the mentalistic approach but despite
this, they still lack of a reference infrastructure that
practically enables such a verification. Verification is supported by
proposals like [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], although the authors do not draft
an infrastructure, while commitment machines [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]
have mainly been used to provide an operational semantics.
Normative approaches, e.g. institutions [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], provide an
answer but with some limitation. Indeed, they tend to
implicitly assume a centralized vision, often realized by introducing
a new actor, whose task is to monitor the interaction: the
institution itself. This assumption is coherent with the fact
that commitment protocols tend to assume that events are
uniformly observed by all the agents although in the real world
this seldom happens; for instance, communications tend to be
point-to-point. For instance, consider an e-commerce seller, a
supplier, and a client: the seller communicates with both the
supplier and the client, who do not interact with one another.
In other words, the interaction between each pair of actors is
point-to-point and cannot be observed by the third party. We
need the infrastructure to support this kind of interaction and
to monitor, in this context, the on-going enactment, checking
whether it respects all the regulative aspects – that the designer
identified as relevant or that the agents agreed.
      </p>
      <p>
        Chopra and Singh [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] addressed the issue of realizing
an architecture that relaxes the centralization constraint by
incorporating the notion of commitment alignment. In this
way it becomes possible to answer to questions like “how
to decide whether agents are acting in a way that complies
to the regulations or not?”, “How to know that an agent
satisfied one of its commitments?” in contexts where events
are not uniformly observable. Nevertheless, they relegated
commitment alignment to the middleware, shielding the issue
of observability of events from the agents and from the
designer. Our claim is that this is a limitation and that in many
real-world situations it is more desirable to have the means of
making clear who can access to what information and who is
accountable for reporting what event. This is especially true
in the case when the protocol allows the representation of
coordination patterns: there is the need of mechanisms for
expressing who can observe what, tracking which part of a
pattern was already followed, which is left to be performed,
who is in charge of the next moves, and so on. As a
consequence, we think that the specification of the coordination
patterns and the design of the infrastructure cannot leave
out the observability of events, which plays a fundamental
role at the level of the protocol specification and, for this
reason, it should be captured by first-class abstractions and
appropriate regulations. Such abstractions/regulations should
be represented in a way that makes them directly manipulable
by the agents [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>IV. COMPOSITION OF COORDINATION PATTERNS</title>
      <p>
        Most of the works concerning software engineering aspects
of commitment protocol specification focus on the formal
verification to help the protocol designer to get rid of or
to enforce given behaviors, [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], [21], [22], [23], [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. An
aspect that is not to be underestimated is the realization of
a development methodology for commitment protocols. The
most relevant representative is the Amoeba methodology [24],
which allows the design of commitment protocols and their
composition into complex business processes. With respect
to the aspects that we are discussing, this methodology,
however, has two main limits. On the one hand, when two
or more protocols are composed, the designer is requested
to define a set of temporal constraints among events and of
data flow constraints to combine the various parts. However,
such constraints do not have any regulatory flavour nor they
have a deontic characterization. On the other hand, since
a wider number of roles are involved, which of the actors
of one protocol is entitled to (and physically can) observe
events generated inside another protocol? The methodology
does not explicitly account for this problem in the description
of the various steps that compose it. For instance, suppose of
composing a protocol that allows a merchant and a supplier
to interact with one that allows the same merchant to interact
with a customer. It is unrealistic to suppose that the client
can observe events involving the supplier, even though after
the composition both actors will play in the same protocol.
Actually, it would be useful to incorporate in the protocol the
means for letting the merchant tell the client that it received
items from the supplier in a way that makes it accountable for
its declarations.
      </p>
    </sec>
    <sec id="sec-5">
      <title>V. CONCLUSIVE REMARKS</title>
      <p>Commitments [25] are a powerful tool for creating
communication and interaction standards with a solid and verifiable
semantics, which is extremely important for dealing with open
worlds, but to this aim there is the need of solving the issues
that we have discussed.</p>
      <p>1) Agent Coordination: how to account for coordination
patterns? We claim that for accounting for coordination
patterns there is the need of enriching the language
for expressing commitment conditions (both antecedents
and consequents) with temporal expressions in a way
that shapes the desired interactions.
2) Infrastructure for Execution: which is the reference
execution infrastructure? In our opinion, there is the need
of reifying interaction protocols as first-class elements
that can be manipulated and inspected by agents, rather
than relegating them to the middleware.
3) Observability of Events: are events really observable by
all agents? In the real world events are not uniformly
observable by all the interacting parties. The
sellershipper-client example shows this fact in practice and
proves that inside commitment protocols there is the
need of specifying and managing objects like claims,
assertions, declarations, statements, so typical in every
day life as well as in programming languages. Indeed, by
stating something about a state of things that the client
cannot observe directly, the seller took a commitment,
though not a practical one. A crucial limitation of the
interaction protocols literature is that here the used
commitments are always practical, meaning that they
describe what the roles involved would bring about (e.g.
a buyer commits to paying for some item). Practical
commitments are limited to the debtor’s own
capabilities and powers (including persuading others), however,
real scenarios often require the account of some event,
without delegating the burden of making it happen to
the agent who gives the account.
4) Composition of Coordination Patterns: is composition
influenced by the previous aspects? All the above aspects
should be supported by appropriate software engineering
methodologies. This will have a positive impact on the
acceptance of declarative approaches inside industrial
settings.
[21] A. Mallya and M. Singh, “An algebra for commitment protocols,”
Autonomous Agents and Multi-Agent Systems, vol. 14, no. 2, pp. 143–
163, 2007.
[22] J. Bentahar, J.-J. C. Meyer, and W. Wan, “Model checking
communicative agent-based systems,” Knowl.-Based Syst., vol. 22, no. 3, pp.
142–159, 2009.
[23] M. El-Menshawy, J. Bentahar, and R. Dssouli, “Symbolic Model
Checking Commitment Protocols Using Reduction,” in Declarative Agent
Languages and Technologies VIII - 8th International Workshop, DALT
2010, ser. Lecture Notes in Computer Science, vol. 6619. Springer,
2011, pp. 185–203.
[24] N. Desai, A. Chopra, and M. Singh, “Amoeba: A methodology for
modeling and evolving cross-organizational business processes,” ACM
Trans. Softw. Eng. Methodol., vol. 19, no. 2, 2009.
[25] M. P. Singh, “Community Standards for Agent
Communication,” July 2010, unpublished Draft, available at
http://www.csc.ncsu.edu/faculty/mpsingh/papers/drafts/Singh-ACManifesto.pdf.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Singh</surname>
          </string-name>
          , “
          <article-title>Agent communication languages: Rethinking the principles</article-title>
          ,
          <source>” IEEE Computer</source>
          , vol.
          <volume>31</volume>
          , no.
          <issue>12</issue>
          , pp.
          <fpage>40</fpage>
          -
          <lpage>47</lpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C.</given-names>
            <surname>Castelfranchi</surname>
          </string-name>
          , “Commitments: From Individual Intentions to Groups and Organizations,”
          <source>in Proc. of ICMAS</source>
          ,
          <year>1995</year>
          , pp.
          <fpage>41</fpage>
          -
          <lpage>48</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <source>“An Ontology for Commitments in Multiagent Systems,” Artificial Intelligence and Law</source>
          , vol.
          <volume>7</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>97</fpage>
          -
          <lpage>113</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>P.</given-names>
            <surname>Yolum</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Singh</surname>
          </string-name>
          , “
          <article-title>Designing and Executing Protocols Using the Event Calculus</article-title>
          ,” in Agents. New York, NY, USA: ACM,
          <year>2001</year>
          , pp.
          <fpage>27</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>N.</given-names>
            <surname>Fornara</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Colombetti</surname>
          </string-name>
          , “
          <article-title>Defining Interaction Protocols using a Commitment-based Agent Communication Language,”</article-title>
          <source>in Proc. of AAMAS. ACM</source>
          ,
          <year>2003</year>
          , pp.
          <fpage>520</fpage>
          -
          <lpage>527</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Winikoff</surname>
          </string-name>
          , W. Liu, and
          <string-name>
            <given-names>J.</given-names>
            <surname>Harland</surname>
          </string-name>
          , “
          <article-title>Enhancing Commitment Machines,” in Proc. of DALT, ser</article-title>
          . LNCS,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Leite</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Omicini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Torroni</surname>
          </string-name>
          , and P. Yolum, Eds., vol.
          <volume>3476</volume>
          . New York, NY, USA: Springer,
          <year>July 2005</year>
          , pp.
          <fpage>198</fpage>
          -
          <lpage>220</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Chopra</surname>
          </string-name>
          , “Commitment Alignment: Semantics, Patterns, and
          <article-title>Decision Procedures for Distributed Computing,”</article-title>
          <source>Ph.D. dissertation</source>
          , North Carolina State University, Raleigh,
          <string-name>
            <surname>NC</surname>
          </string-name>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Torroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Chesani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Mello</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Montali</surname>
          </string-name>
          , “
          <article-title>Social Commitments in Time: Satisfied or Compensated,”</article-title>
          <source>in Proc. of DALT</source>
          , vol.
          <volume>5948</volume>
          ,
          <year>2010</year>
          , pp.
          <fpage>228</fpage>
          -
          <lpage>243</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>El-Menshawy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bentahar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Dssouli</surname>
          </string-name>
          , “
          <article-title>Verifiable Semantic Model for Agent Interactions Using Social Commitments,”</article-title>
          <source>in Proc. of LADS</source>
          , vol.
          <volume>6039</volume>
          ,
          <year>2010</year>
          , pp.
          <fpage>128</fpage>
          -
          <lpage>152</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Baldoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Baroglio</surname>
          </string-name>
          , E. Marengo, and V. . Patti, “
          <article-title>Constitutive and Regulative Specifications of Commitment Protocols: a Decoupled Approach,” ACM TIST, Spec</article-title>
          .
          <source>Iss. on Agent Communication</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>P.</given-names>
            <surname>Yolum</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Singh</surname>
          </string-name>
          , “Commitment Machines,”
          <source>in Proc. of ATAL</source>
          ,
          <year>2002</year>
          , pp.
          <fpage>235</fpage>
          -
          <lpage>247</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Baldoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Baroglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Chopra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Desai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Patti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Singh</surname>
          </string-name>
          , “Choice, Interoperability, and Conformance in Interaction Protocols and Service Choreographies,”
          <source>in Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems, AAMAS</source>
          <year>2009</year>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Decker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sichman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Sierra</surname>
          </string-name>
          , and C. Castelfranchi, Eds. Budapest, Hungary: IFAAMAS, May
          <year>2009</year>
          , pp.
          <fpage>843</fpage>
          -
          <lpage>850</lpage>
          . [Online]. Available: http://www.conferences.hu/AAMAS2009/
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>E.</given-names>
            <surname>Marengo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Baldoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Baroglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Chopra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Patti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Singh</surname>
          </string-name>
          , “
          <article-title>Commitments with Regulations: Reasoning about Safety and Control in REGULA,”</article-title>
          <source>in Proc. of AAMAS</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>467</fpage>
          -
          <lpage>474</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alberti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gavanelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Lamma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Chesani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Mello</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Torroni</surname>
          </string-name>
          , “
          <article-title>Compliance verification of agent interaction: a logic-based software tool</article-title>
          ,
          <source>” Applied Artificial Intelligence</source>
          , vol.
          <volume>20</volume>
          , no.
          <issue>2-4</issue>
          , pp.
          <fpage>133</fpage>
          -
          <lpage>157</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>F.</given-names>
            <surname>Chesani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Mello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Montali</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Torroni</surname>
          </string-name>
          , “
          <article-title>Commitment Tracking via the Reactive Event Calculus,”</article-title>
          <source>in Proc. of the 21st International Joint Conference on Artificial Intelligence</source>
          , IJCAI, C. Boutilier, Ed., Pasadena, California, USA,
          <year>July 2009</year>
          , pp.
          <fpage>91</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Singh</surname>
          </string-name>
          , “
          <article-title>Formalizing Communication Protocols for Multiagent Systems,”</article-title>
          <source>in Proc. of IJCAI</source>
          ,
          <year>2007</year>
          , pp.
          <fpage>1519</fpage>
          -
          <lpage>1524</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>N.</given-names>
            <surname>Fornara</surname>
          </string-name>
          , “Interaction and Communication among Autonomous Agents in
          <source>Multiagent Systems,” Ph.D. dissertation</source>
          , Universita` della Svizzera italiana,
          <source>Facolta` di Scienze della Comunicazione</source>
          ,
          <year>June 2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Chopra</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Singh</surname>
          </string-name>
          , “
          <article-title>An Architecture for Multiagent Systems: An Approach Based on Commitments,” in Proc. of ProMAS, ser</article-title>
          .
          <source>LNAI</source>
          , vol.
          <volume>5919</volume>
          . Heidelberg: Springer,
          <year>2009</year>
          , pp.
          <fpage>148</fpage>
          -
          <lpage>162</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Baldoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Baroglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Marengo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Patti</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Ricci</surname>
          </string-name>
          , “
          <article-title>Back to the future: An interaction-oriented framework for social computing,” in First Int</article-title>
          . Workshop on Req.
          <article-title>Eng. for Social Computing, RESC</article-title>
          . IEEE,
          <year>2011</year>
          , pp.
          <fpage>2</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>P.</given-names>
            <surname>Yolum</surname>
          </string-name>
          , “
          <article-title>Design time analysis of multiagent protocols,” Data Knowl</article-title>
          . Eng., vol.
          <volume>63</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>137</fpage>
          -
          <lpage>154</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>