416
Views
24
CrossRef citations to date
0
Altmetric
Original Articles

STRATUM: A METHODOLOGY FOR DESIGNING HEURISTIC AGENT NEGOTIATION STRATEGIES

, , &
Pages 489-527 | Published online: 09 Jul 2007

Abstract

Automated negotiation is a powerful (and sometimes essential) means for allocating resources among self-interested autonomous software agents. A key problem in building negotiating agents is the design of the negotiation strategy, which is used by an agent to decide its negotiation behavior. In complex domains, there is no single, obvious optimal strategy. This has led to much work on designing heuristic strategies, where agent designers usually rely on intuition and experience. In this article, we introduce STRATUM, a methodology for designing strategies for negotiating agents. The methodology provides a disciplined approach to analyzing the negotiation environment and designing strategies in light of agent capabilities and acts as a bridge between theoretical studies of automated negotiation and the software engineering of negotiation applications. We illustrate the application of the methodology by characterizing some strategies for the Trading Agent Competition and for argumentation-based negotiation.

INTRODUCTION

Computer systems are increasingly being viewed in terms of multiple, interacting autonomous agents. This is because the multi-agent paradigm offers a powerful set of metaphors, concepts, and techniques for conceptualizing, designing, implementing, and verifying complex distributed systems (Jennings, Citation2001). In this context, an agent is viewed as an encapsulated computer system that is situated in an environment and is capable of flexible, autonomous action in order to meet its design objectives (Wooldridge, Citation2002). Building upon this, applications of agent technology have ranged from electronic trading and distributed business process management, to air-traffic and industrial control, to health care and patient monitoring, to gaming and interactive entertainment (Jennings and Wooldridge, Citation1998; Parunak, Citation1999; Luck et al., Citation2003).

In more detail, in a multi-agent system (MAS), agents need to interact. For example, when agents are cooperative (e.g., coordinating robots in a disaster rescue application), they need to communicate in order to obtain a shared view of the environment and to coordinate their activities effectively (Tambe et al., Citation2005). In applications where agents are self-interested (e.g., in a trading environment), they also need to interact in order to negotiate and agree on resource exchanges. In many such applications, communication is essential due to the lack of central coordination or resource allocation mechanisms.

We offer the following definition of negotiation, adapted from work on the philosophy of argumentation (Walton and Krabbe, Citation1995):

Negotiation is a form of interaction in which a group of agents, with conflicting interests and a desire to cooperate, try to reach a mutually acceptable agreement on the division of scarce resources.

The use of the word “resources” in the definition above is to be taken in the broadest possible sense. Thus, resources can be commodities, services, time, money, etc. In short, anything that is needed to achieve something. Resources are “scarce” since competing claims over them cannot be fully simultaneously satisfied. In a multi-agent system context, the challenge of automated negotiation is to design mechanisms for allocating resources among software processes representing self-interested parties, be these parties human individuals, organizations, or other software processes.

To date, various interaction and decision mechanisms for automated negotiation have been proposed and studied. These include: game-theoretic analysis (Kraus, Citation2001; Rosenschein and Zlotkin, Citation1994; Sandholm, Citation2002); heuristic-based approaches (Faratin, Citation2000; Fatima et al., Citation2002; Kowalczyk and Bui, Citation2001); and argumentation-based approaches (Kraus et al., Citation1998; Parsons et al., Citation1998; Sierra et al., Citation1998).

A central feature of all these negotiation mechanisms is that agents have some choice of what they may utter, and possibly when they may make utterances. Open-cry auction participants, for example, choose both the content of their utterances (within the constraints of the particular auction protocol) and the timing of their utterances; participants in a sealed-bid, single-round auction may only choose the content. In argumentation-based approaches, participants have still greater freedom in their choice of the content (covering issues such as threats, promises, appeals, etc.) and timing of utterances.

Given this range of options, agent designers therefore face an important question: What should an agent say, and when, in a particular negotiation interaction?

To answer this question, we turn to the realm of negotiation strategies, which are here defined as rules or algorithms that provide an answer to this question.

Now for certain types of negotiation frameworks, game theory can be used to characterize optimal strategies and predict the outcomes of a game (Binmore and Vulkan, Citation1997). However, it has been argued that game-theoretic approaches are insufficient for designing strategies in complex domains (Jennings et al., Citation2001). This leaves a gap to be filled, as there are no structured approaches to designing strategies for such complex domains. In fact, most strategies in such frameworks have thus far been designed by resorting more or less to intuition and experience. To rectify this, we present a methodology that guides agent designers in the design and selection of strategies for agents engaged in negotiation interactions. The methodology provides a disciplined approach to analyzing the negotiation environment and designing strategies in light of agent capabilities.

This article advances the state-of-the-art in automated negotiation in two main ways. Firstly, the article presents the first structured methodology for guiding agent designers in designing and selecting strategies in complex, open negotiation domains. Here we exemplify such domains by considering the Trading Agent Competition and argumentation-based negotiation. Secondly, the methodology presents a step toward understanding the common underlying principles of negotiation strategies in various complex domains. This has the potential to enable agent designers to reuse strategies or strategy components across multiple domains and select between strategies based on the characteristics of a given domain. Hence, our methodology can act as a bridge between the theoretical and simulation-based studies of automated negotiation on one hand and the software engineering of practical applications of automated negotiation on the other.

The rest of the article is organized as follows. In the next section, we motivate the need for a strategy design methodology. Then, we present the STRATUM methodology for strategy design. Then, we demonstrate how the methodology can be applied by considering two case studies: one from the Trading Agent Competition (Eriksson and Janson, Citation2002); the other from argumentation-based negotiation (Rahwan et al., Citation2003).

WHY A METHODOLOGY IS NEEDED

In this section, we motivate the need for a strategy design methodology. In the next subsection, we demonstrate that the analytical approach of game theory is not suitable in certain domains. Then, we also demonstrate why agent-oriented software engineering methodologies fall short of providing structure to the strategy design process. The last subsection scopes the contribution of the article in light of these observations.

Relation to Automated Negotiation Approaches

Researchers in the area of MAS initially used the tools of classical game theory to design strategies for negotiating agents (Rosenschein and Zlotkin, Citation1994). In game-theoretic analysis, researchers typically attempt to determine the optimal strategy by analyzing the interaction as a game between participants and seeking its equilibrium (Harsanyi, Citation1956; Stengel, 2002). The strategy determined by these methods is typically shown to be optimal for a participant, given the game rules, the assumed payoffs and preferences of participants, and assuming that agents have common knowledge that they are all rationalFootnote 1 and that participants have no knowledge of one another not provided by introspection. In such cases, it is possible to use game-theoretic techniques in order to design resource allocation mechanisms that force agents to follow prescribed optimal strategies (Dash et al., Citation2003).

However, it quickly turned out that the assumptions of game theory are often not satisfied in multi-agent systems (Jennings et al., Citation2001). The results of classical game theory (e.g., about the optimal strategies) are only valid under the assumptions of perfect rationality.Footnote 2 However, in real applications, agents may be resource constrained, malicious, or whimsical or simply badly coded, so that participant behavior may not conform to the assumptions of economic rationality. In such cases, researchers have turned to heuristic methods. Heuristics are rules of thumb that produce “good enough” outcomes and are mainly based on empirical testing and evaluation. In heuristic-based frameworks, strategies have been proposed that are based on, for example, the underlying utility model, decay functions of factors such as utility and time (Faratin, Citation2000; Kraus, Citation2001), or fuzzy modeling of the environment (He et al., Citation2003). Very specific bargaining strategies have been analyzed, for example, by investigating their optimality (Fatima et al., Citation2001), their performance in multiple negotiation rounds (Faratin, Citation2000), or the resulting social welfare (Harsanyi, Citation1956).

However, there is no “methodology” for guiding designers of strategies in heuristic-based frameworks. So, given a new type of negotiation domain, such as the travel services market of the Trading Agent Competition (TAC, Citation2003), there is little guidance on how one might go about designing negotiation strategies.

Another type of framework that challenges game-theoretic approaches is what is becoming known as the argument-based negotiation approach (Rahwan et al., Citation2003b). In these frameworks, agents can exchange, in addition to proposals and indications of their acceptance or rejection, other meta-information about proposals, such as the reasons for proposals and the reasons for accepting or rejecting them. Here, strategies were also proposed on an ad hoc basis (Sierra et al., Citation1998; Sadri et al., Citation2001) possibly inspired by the psychology of human persuasion (Kraus et al., Citation1998; Ramchurn et al., Citation2003). Thus, there has been little work that investigates generic principles underlying these heuristics.

While the game-theoretic approach is well understood, we are motivated by the lack of methodology for guiding designers of strategies in heuristic-based or argumentation-based negotiation encounters. It would be of value, therefore, to provide a methodology that gives generic guidelines for strategy designers operating under such frameworks. To this end, this article takes the first step toward characterizing a methodology for designing strategies under complex protocols and relaxed assumptions. Thus, given a specific heuristic or argumentation-based encounter described in terms of interaction rules and a set of agents participating in negotiation, the methodology would assist agent designers in distilling essential features of the framework and using these to incrementally design sophisticated strategies.

Relation to AOSE Methodologies

In recent years, there has been an increase in research on agent-oriented software engineering (AOSE) methodologies. A number of AOSE methodologies have been proposed for guiding the design and construction of multi-agent systems, such as GAIA (Zambonelli et al., Citation2003; Wooldridge et al., Citation2000), Tropos (Bresciani et al., Citation2004), ROADMAP (Juan et al., Citation2002), Prometheus (Padgham and Winikoff, Citation2004), OperA (Dignum, Citation2004), and AUML (Bauer et al., Citation2001). One might reasonably ask whether AOSE methodologies could provide the answer to the problem of strategy design for protocols that cannot be studied using game-theoretic tools.

Now there have been some attempts to use or produce AOSE methodologies to engineer negotiation protocols and agents. For example, Ashri et al. (Citation2003) use the SMART agent construction model (d'Inverno and Luck, Citation2001) to specify negotiating agent architectures. Fritschi and Dorer (Citation2002) use an AOSE methodology to construct an agent that participated in the Trading Agent Competition. Kungas and Rao (Citation2004) present a methodology for agent-based Web service discovery and automated composition using negotiation. Dumas et al. (Citation2002) propose a formal language for specifying negotiating agent behavior, which combines state charts (Harel and Naamad, Citation1996) and defeasible logic programs (Billington, Citation1993).

However, AOSE methodologies are typically concerned with the process of capturing domain requirements before the agent system exists and then transforming these requirements into multi-agent system specifications. During this process, system designers can follow the methodology as they describe the environment, agent capabilities, roles, relationship structures, interaction protocols, and so on. When it comes to specifying agents, current AOSE methodologies usually assume that agents are specified by the same designer or, if specified by multiple designers, that they are cooperative. In an open system, where agents can be programmed by anyone, and cannot be assumed cooperative, current AOSE methodologies provide no advice on the design of negotiation strategies.

The methodology we present here should not be seen as a competitor to existing AOSE methodologies when they are applied to specifying open negotiation environments. Instead, our methodology complements AOSE methodologies since we assume a multi-agent system specification is partially given (implicitly or explicitly) using some language, and we provide guidance to an agent designer in programming strategies that operate within the given specification.

Scope

In this subsection, we define more precisely the scope of this article. This requires a characterization of the various components of a negotiation framework. A negotiation framework can be seen to involve the following (Bartolini et al., Citation2002):

  1. a negotiation locale, which is a communication platform through which agents interact;

  2. a host (or monitor) that manages the negotiation locale and facilitates the negotiation, making sure participants abide by the protocol rules, pay violation fines, etc.;

  3. a negotiation template, which is essentially a language for describing deals;

  4. a set of negotiation rules, which include:

    1. rules for participant admission;

    2. rules for checking proposal validity;

    3. rules for protocol enforcement, which include rules that specify when agents can make proposals, accept proposals, make other utterances, etc.;

    4. rules for updating status and informing participants, which specify when agents can access what information and how the overall state of the negotiation (e.g., current highest bid) is updated;

    5. rules for agreement formation, which specify when an agreement is reached (e.g., an English auction ends with agreement if an acceptable bid is not exceeded by another bid within a specified time period);

    6. termination rules, which specify under what conditions the negotiation terminates (successfully or unsuccessfully);

  5. a number of participants, with their internal decision-making components (e.g., their architectures, proposal evaluation logic, etc.) and their negotiation strategies.

This article is specifically concerned with the design of the participants in a negotiation framework, and in particular with their strategies. To this end, Figure depicts the scope of our methodology, which has the specific purpose of helping designers of participating agents specify their agents' negotiation strategies. We are hence not concerned with guiding software engineers in designing the rules of negotiation or specifying languages for describing agreements, etc. In fact, we assume a negotiation framework or mechanisms is given and specified, formally or informally, in some form. However, since the effectiveness of strategies is highly dependent on the nature of the underlying negotiation framework (rules, templates, etc.), the methodology also guides agent strategy designers in distilling framework characteristics that are relevant and useful for strategy design.

FIGURE 1 Scope of the STRATUM methodology.

FIGURE 1 Scope of the STRATUM methodology.

A METHODOLOGY FOR STRATEGY DESIGN

In this section, we introduce the STRATUM (for STRATegy via Unorthodox Methodology)Footnote 3 methodology for designing agent negotiation strategies.

The main function of the STRATUM methodology is to guide the designer of negotiation strategies from domain and requirements analysis to producing modular high-level specifications of strategies. These specifications should be generic enough to provide flexibility in the underlying implementation details and specific enough to provide thorough and useful guidance for programming strategies.

Typically, methodologies for software construction comprise a number of stages. Each stage may result in one or more models that describe various aspects of the problem or the system using some informal or formal abstraction or language. STRATUM consists of the stages described in Figure . The stages arose from our earlier work on characterizing strategic factors in negotiation (Rahwan et al., Citation2003a). These stages should not be understood as a strictly sequential process. The arrows represent the overall direction of logical dependency between the models, but the designer may do the development by iterative refinement across stages. In the next subsections, we discuss each of these stages in more detail.

FIGURE 2 Stages of the methodology.

FIGURE 2 Stages of the methodology.

Stage I: Specify Objectives Model

The Objectives Model (OM) specifies the objectives of the agent. This may be as simple as “maximize own expected utility” or involve a more complex specification of the types of goals the agent needs to achieve in the world (e.g., to increase the market share and minimize negotiation time), the safety conditions it has to maintain (e.g., maintain minimum budget deficit), the constraints imposed on these objectives (e.g., never concede on quality), and so on. The OM may be expressed using natural language statements but may also be specified formally; for example, using some objective or utility function.

We assume that we are dealing only with purposeful agents. Hence, each party to a negotiation may be assumed to have some objectives that lead it to enter into the negotiation interaction. These objectives may be at the highest level of an agent's stack of goals or they may not be, in which case they may support some other, even higher, goals. Entering into a particular negotiation interaction over certain resources with particular agents at a particular time will, the agent believes, assist it in seeking to achieve these goals.

An agent's negotiation objectives may be a particular agreement to divide the scarce resources under discussion. Such an outcome, however, is not the only objective an agent may have. Indeed, an agent may enter into an interaction with no intention of seeking a division of the resources in question, but merely to confuse, distract, or otherwise delude the other participants, or even non-participants. An agent may also engage in a negotiation interaction to acquire information about a new domain, as when potential house-buyers participate in auctions in order not to purchase a house but to educate themselves about prevailing house prices, or even about the auction process itself.

Agents may even enter into a negotiation interaction with one counterpart in order to have a stronger negotiation position relative to another counterpart in a separate interaction; business-to-business negotiations often involve such parallel, competitive negotiations (Lilien et al., Citation1992). These objectives are all valid—and, by any definition, rational—objectives from a negotiation interaction. Their wisdom, feasibility, or ethical content, though, are separate issues.

Note that the agent designer may not know precisely, at design time, in what encounters and with what counterparts the agent will be engaged. However, since agents are assumed to be “goal directed” or “purposeful,” it should be possible to spell out their overall objective. This overall objective may be realised in different ways depending on the type of encounter. Such detail is specified in stages III and IV, which are described below.

Stage II: Distill Capabilities Model

A key influencing factor on strategy design is the interaction capabilities of the agent negotiator—what the agent is capable of doing in the interaction. These capabilities constitute the agent's capabilities model (CM). These interaction capabilities are mainly characterized by the interaction protocol the agents use. We assume that the protocol is already given by the negotiation host designer (e.g., specification of auction rules or communication language). Two main types of capabilities may exist:

  1. Dialogical abilities: These specify what the agent is capable of uttering to other agents. Such capabilities may be specified in terms of the communication language used and the protocol rules that govern the use of this language. Capabilities may also be constrained through some system of value, such as a system for tracking agents' commitments to check their consistency (Maudet and Chaib-draa, Citation2003), or a system of reputation or trust that removes agents that behave in a deceptive or misleading manner.

  2. Relevant non-dialogical abilities: An agent may have non-dialogical capabilities that may impact its dialogical abilities. Consider, for example, an agent who wants to promise another agent to deliver a fuel tank at a certain time. If the mechanism given prohibits agents from lying or decommitting on their promises, then the agent must actually have access to a fuel tank and be capable of moving it to the specified address at the specified time. In other words, the agent can only make the promise (a dialogical ability) if it is capable of fulfilling the promise (a non-dialogical ability).

Our interest here is in the dialogical abilities, and implicitly in the non-dialogical abilities—but only insofar as the latter contribute to the former. So, for example, an agent's ability to inflict physical damage on another agent is only relevant to negotiation if this ability can be used to create dialogical threats against that agent, such as “if you do not accept my proposal, I will hurt you.” Finally, we stress that here we are not interested in the specifics of the agent's internal capabilities (i.e., its ability to evaluate an offer or generate preferences) but only in the dialogical manifestations of such abilities (i.e., the ability to communicate desires to other preferences).

At the bottom level, an agent engaged in a negotiation interaction must be able to make utterances that are legal according to the rules of the protocol. Above this level are some higher order capabilities, which may, depending on the specific protocol, require utterance of a sequence of locutions to be effected. Typical types of dialogical capabilities needed in a negotiation encounter are listed in Table . This set of capabilities was compiled based on observations of the automated negotiation literature (Jennings et al., Citation2001) as well as literature on human negotiation (Young, Citation2001; Lewicki et al., Citation2003). A specific protocol may enable only a subset of these capabilities. Moreover, a specific protocol may enable only certain subtypes of these capabilities. For example, a protocol may enable an agent to provide information proactively (capability C4) about its preferences but not its beliefs. In any case, the agent designer must have a clear picture of the agent's dialogical capabilities.

TABLE 1 Common Types of Dialogical Capabilities in a Negotiation Encounter

Of course, an agent may be said to also have capabilities that are complex combinations of these. For example, the ability to prevaricate (Dunne, Citation2003) may be constructed from abilities to: request irrelevant information; provide irrelevant, misleading, or confusing information; or repeat previous questions or statements. Such capabilities may constitute negotiation tactics or strategies and will be discussed in Stage IV.

The CM is specified by the agent designer as a list of capabilities, which is a subset of the list given in Table . In addition, the designer could provide a detailed description of how each capability can be performed. This may include, for example, the protocol utterances that facilitate each capability or its enabling non-dialogical capabilities.

When identifying the agent's capabilities, the designer also needs to take account of constraints on the exercise of any potential capabilities. Such constraints could include:

  1. Interaction Protocol: The rules of the negotiation interaction protocol may preclude or require certain utterances or certain types of utterances by agents at particular times in an interaction. The FIPA Agent Communications Language, FIPA ACL, for example, requires agent sincerity: only statements that are believed by an agent may be uttered using the inform locution (Foundation for Intelligent Physical Agents, Citation2001). In principle, such a condition must severely limit the use of FIPA ACL for negotiations.

  2. Values: By values, we refer to the “criteria” that motivate and constrain the agent's behavior. Examples of such values include “maximizing expected utility,” “maximizing social welfare,” or “avoiding deceptive behavior.” The agent's values may preclude or require certain behaviors and so constrain the potential capabilities of the agent. Young (Citation2001), for example, argues that the strategies of human negotiators are significantly influenced by the value of maintaining their social identity.

  3. Resource Constraints: Time, memory, or processing limitations on an agent may limit its capabilities in a negotiation interaction.

Stage III: Construct Environment Model

This stage involves providing some representation of the negotiation environment, including the negotiation counterparts, for the sake of reasoning about them. The result constitutes what we refer to as the environment model (EM) model. Reasoning about this model, either by the strategy designer at design time, or by the automated agent at run time, would provide a basis for the design and selection of appropriate strategies.

The environment model describes one or more of the following:

Model of counterpart: This model captures how the negotiation counterparts behave, the information they may have, or how they are likely to behave. For example, an agent wishing to acquire a resource may attempt to model the negotiation behavior of the providers of these resources. Providers may be hard, using set prices, or they may be soft, conceding on price after a few bargaining rounds.

Model of peer: This model captures how other negotiators behave in the system. For example, an agent wishing to acquire a resource may attempt to model other competing consumers of that resource. If there are many consumers with aggressive demand, this may give providers extra market power and hence decrease their willingness to concede with other consumers.

Model of external conditions: Instead of modeling specific behavior of counterparts or peers, an agent may attempt to model the external conditions that affect these behaviors. For example, the designer of an agent bidding in an exchange over oil stocks may attempt to consider the expected economic conditions that would affect oil supplies and consequently demand and prices. It is notable that the model of external conditions only captures the agent's perception of these conditions and hence does not necessarily reflect the actual conditions.

Modeling other agents is a growing area of research, and techniques range from probabilistic modeling of individual agent beliefs (Milch and Koller, Citation2000; Gal and Pfeffer, Citation2003) to qualitative modeling of group mental attitudes (Boella and van der Torre, Citation2004). Modeling the economic conditions has also begun to receive some attention in the automated negotiation literature. For example, He et al. (Citation2003) enable agents to model the “state of the marketplace,” based on observations of supply and demand, and adjust their bidding strategies accordingly using a meta-strategy based on preprogrammed fuzzy rules.

STRATUM does not prescribe a particular method for modeling the environment, as different methods would be more suitable for different types of negotiation frameworks. However, we do provide a list of typical environment features that the strategy designer could look for. These features, described in Table , can be used as a blueprint to guide the selection of the most appropriate environment modeling method.

TABLE 2 Typical Environment Characteristics

Stage IV: Construct Tactics and Strategies

With the objectives identified, capabilities clarified, and environment understood, we can proceed to designing actual strategies. This process constitutes the tactic and strategy design stage. Intuitively, tactics represent detailed low-level patterns of behavior, whereas strategies represent more sophisticated negotiation behavior that makes use of simpler tactics.

Goal Decomposition vs. Tactic Composition

As stated earlier, we assume an agent enters a particular negotiation interaction over particular resources using a particular interaction protocol with particular counterpart agents at a particular time, in order to achieve its negotiation objectives. In order to achieve these objectives, the agent may attempt to achieve some subobjectives, with the belief that such subobjectives assist in realizing the overall negotiation objectives.Footnote 4 Subobjectives themselves may be further decomposed into lower level sub-sub-objectives, and so on. We can therefore see the process of strategy design in a compositional fashion.Footnote 5

For example, a potential buyer entering into a negotiation with a car dealer aiming to buy a car may seek to achieve this negotiation objective by realizing each of the following subobjectives (in sequence):

  • X. learning about the alternative models available from the dealer

  • Y. establishing a preference ordering over some or all of these models

  • Z. getting a cheap price for the most preferred model.

The buyer might achieve the first subobjective by posing a series of questions to the car dealer. The second subobjective may be achieved by introspection, perhaps involving a process of comparison of the expected utilities of different models (Roberts and Lattin, Citation1991). To achieve the third subobjective, the buyer may seek to achieve two lower level objectives:

  • Z.1 Informing the dealer about an offer made by a competing dealer; and

  • Z.2 Bargaining with the dealer through an exchange of offers.

Each of these sub-sub-objectives may be achieved directly by making a series of utterances or through decomposition into further subobjectives, and so on. This process guides the design of tactics and strategies.

Given this, Figure depicts the interleaving processes of decomposing negotiation objectives and composing capabilities. Objectives are decomposed in a top-down fashion, while capabilities are composed in a bottom-up fashion in order to construct tactics and strategies that achieve these objectives. For example, to achieve the main negotiation objective, the designer may specify that the agent needs to achieve subobjectives SO-1 through to SO-n. Each of these subobjectives may need to be further decomposed into sub-sub-objectives, and so on. The same thing takes place, bottom-up, while composing tactics from capabilities. In the figure, the arrow between the two trapezoids denotes that capability description is informed by the decomposition of objectives and vice versa—objectives decomposition is informed by the capabilities available.

FIGURE 3 Decomposing objective top-down; composing capabilities bottom-up.

FIGURE 3 Decomposing objective top-down; composing capabilities bottom-up.

In the process of objective decomposition and strategy composition, various types of interdependencies may be revealed. First, some objectives may be found to be unachievable because the agent simply does not have the required capabilities. For example, if an agent is not allowed to withdraw from the negotiation, then it cannot threaten to do so. In such cases, alternative subobjectives should be identified in order to achieve the main negotiation objective.

Similarly, the parallel inspection of objectives and capabilities may reveal new possible objectives and/or tactics/strategies. More specifically, after attempting to map a given subobjective to a combination of capabilities, the designer may discover that the capabilities can be combined in a way not previously thought of. This combination could achieve a new, alternative subobjective that proves to be useful.

Objective decomposition and strategy composition may also reveal conflicts among two or more objectives; for example, because they require the use of mutually exclusive capabilities. In such cases, the designer should consider trade-offs between different conflicting objectives or seek alternative ways in which conflict could be avoided. The same could be said about discovering conflicts among two or more capabilities, tactics, or strategies, which means they should not be used in combination.

At the end of this stage, there must be a correspondence between the objectives hierarchy and the tactics/strategies hierarchy. In other words, each objective or subobjective, etc., must be achievable through a particular tactic or combination of tactics, and each tactic must have an objective or subobjective, etc., as its purpose. This correspondence need not be a one-to-one mapping, however, since a single tactic may contribute to more than one objective, and a single objective may require more than one tactic. However, the lack of one-to-one mapping reveals discrepancy in abstraction between the two hierarchies and should be avoided if possible.

Composing Tactics and Strategies

We now list a number of possible low-level tactics (or equivalently, low-level subobjectives) that may contribute to an agent's achievement of its negotiation objectives. To date, no comprehensive list of all possible applicable negotiation tactics is available in the multi-agent literature or in the literature on human negotiation. Therefore, we list those tactics inspired by the multi-agent negotiation literature as well as informal advice to human negotiation participants (Fisher et al., Citation1991; Young, Citation2001; Lewicki et al., Citation2003).

  1. Seek to change a counterpart's beliefs. One participant in a negotiation may judge it to be in its interests to have other participants believe certain propositions about the beliefs, intentions, preferences, or constraints of the first participant or about the domain in question. These propositions may be true or false. Providing information to the counterparts may enable an agent to explain the reasons for its beliefs, preferences, etc. It has been argued (Fisher et al., Citation1991; Rahwan et al., Citation2003c) that agreement is more likely in negotiation interactions when participants understand each others' interests (desires, preferences, goals, etc.) rather than their current positions.

  2. Gain a better understanding of a counterpart. An agent may have uncertain or incomplete information about its counterpart. Moreover, counterparts may be seeking to mislead a participant about their beliefs, intentions, preferences, constraints, etc., or about the domain. An agent may then seek to gain a better understanding of its counterpart's true mental states or constraints.

  3. Seek to discuss a particular issue. By moving the interaction toward particular issues, a participant may be able to frame the problem in certain ways and thus influence the mental states of its counterparts. A seller of a particular make of car, for example, may seek to turn the topic of discussions with potential buyers toward attributes on which this make of car scores highly.

  4. Seek to avoid discussion. For the same reasons, a participant may wish to steer discussion away from particular issues.

  5. Seek fast termination. An agent with time or processing resource constraints might seek a fast resolution or termination of the negotiation.

  6. Seek to delay. An agent who believes it has greater time or other resources than other participants may seek to delay resolution of the interaction beyond the perceived resource limits of its counterpart (Dunne, Citation2003).

  7. Resist a counterpart. An agent may resist attempts by a counterpart to achieve one of the above tactics.

With these main tactic types in mind, the strategy designer can start specifying tactics to be used by the software agent. Specification of these tactics must take into account the actual capabilities of the agent (as discussed above). Tactic descriptions can also be compositional, so a tactic can make use of other tactics already specified. In this respect, STRATUM provides the designer with a tactic or strategy template, which is used to specify various tactics. A particular instantiation of this template is called a tactic description or strategy description. The tactic template, instantiated with the tactic described in previously, is described in Table .

TABLE 3 Template for Tactic and Strategy Description

Each tactic description specifies the dialogical objective it is aimed at achieving. The method cell contains an informal description of the different steps the tactic involves in order to achieve its dialogical objective. The capabilities and sub-tactics used to execute these steps are specified in the following cell. Finally, the rationality condition specifies any constraints on the rational use of the tactic. For example, one may specify that it is only rational to make an offer to a counterpart if this offer is more preferred to the counterpart than any previously made offer. Finally, the designer can list the potential risks of enacting the strategy. This would enable the programmer of the strategy to take these risks into account and provide suitable solutions or precautions.

The process of designing strategies using tactics is similar to designing tactics using primitive capabilities. We follow the intuitive distinction between strategies, which govern an entire interaction or large parts of it, and tactics, which govern just a small number of utterances in an interaction. Hence, one tactic may support multiple or competing strategies. For example, asking a direct question may implement a strategy to gather information from another participant or it may implement a strategy to delay resolution of the negotiation, or both. The methodology leaves to the designer the decision about whether to refer to something as a “tactic” or a “strategy.”Footnote 6 One might argue that this renders the distinction between tactics and strategies redundant. Nevertheless, this conceptual distinction may be useful from the strategy designer's point of view. Indeed, this distinction has proved useful; for example, in the work on natural language generation (McKeown, Citation1985).

Stage V: Test and Refine

The final stage of the methodology is to test the strategy in terms of some appropriate criteria or metrics. This testing may also lead to an iterative process of refinement, based on the new findings.

One way to perform testing is through empirical analysis. This would involve running simulations of different dialogues using a variety of strategies. Simulation parameters could be varied in a number of ways: among different strategies operating against a fixed type of counterpart, among different types of low-level tactics within a particular generic strategy, in terms of the types of counterparts faced, the information available to agents, or the agent's time constraints. Such simulations have started to be used to analyze bargaining-based (Faratin, Citation2000), auction-based (He et al., Citation2003), and (to a lesser extent) argument-based strategies (Ramchurn et al., Citation2003).

Another way to test strategies is through theoretical analysis. In game theory, this is normally done using equilibrium analysis, though this approach is usually aimed at designing the mechanism, not the strategy. For strategies that cannot be studied using traditional game-theoretic techniques, it is often hard to analyze strategies theoretically. Hybrid theoretical/empirical approaches have been used, where the outcomes under different strategies are first generated empirically and then studied analytically using game-theoretic concepts. This approach has been used, for example, by Fatima et al. (2004) to study bargaining in incomplete information settings. In economics, behavioral game theory (Camerer, Citation2003) uses a hybrid approach whereby simulation experiments are first designed and run. Then, regularities in repeated interactions are explored and studied analytically to identify evolutionary equilibrium conditions.

Summary of the Methodology

The STRATUM methodology is summarized in Figure . Stages I, II, and III produce the OM, CM, and EM, respectively. Then Stage IV involves the simultaneous decomposition of objectives and composition of capabilities in order to produce tactics that eventually form strategies. Finally, the testing and refinement stage leads to either (i) adjusting the environment and counterpart model or (ii) repeating Stage IV with different decompositions of objectives and compositions of capabilities.

FIGURE 4 Abstract view of the methodology.

FIGURE 4 Abstract view of the methodology.

It is worth noting that the clarity of the given multi-agent system specification influences the ease in which the OM, CM, and EM can be captured by the negotiating agent designer. In some situations, the designer is given explicit specifications of the objectives, the agent's capabilities, and the environment in which agents operate, making the OM, CM, and EM easy to capture. This is the case, for example, when the protocol is specified clearly in terms of declarative rules or where the counterparts are fully predictable (e.g., in complete information settings). On the other hand, if the multi-agent system is not thoroughly specified, the strategy designer needs to make these implicit models explicit.

APPLYING THE METHODOLOGY

In this section, we demonstrate, through two case studies, how the STRATUM methodology can be used to aid the design of tactics and strategies in particular negotiation frameworks. In the first case study, we explore an existing strategy used in the Trading Agent Competition (TAC, Citation2003) and demonstrate that STRATUM captures notions that the designers have included in the design of their strategy. In the second case study, we present another case that addresses a different style of negotiation; namely interest-based negotiation (IBN) between two agents (Rahwan, Citation2004).

We selected these two domains for our case studies because they exemplify significantly different approaches to automated negotiation. The TAC domain involves multiple concurrent negotiations using a variety of auction-based protocols. Here, the focus is on modeling the general dynamics of the environment and reacting accordingly. The IBN domain, on the other hand, involves a richer communication language based on computational models of argumentation. Here, the focus is on modeling the negotiation counterpart and planning an argumentation strategy to persuade the opponent of changing its beliefs and goals.

It is worth noting that we do not undertake a thorough and complete application of the STRATUM methodology in the case studies below. Instead, our aim is to give the reader a feel for how the different stages of the methodology can be applied in particular, relatively rich, negotiation scenarios.

Case Study 1: Trading Agent Competition

We now deconstruct an existing strategy used by an agent participating in the Trading Agent Competition (TAC, Citation2003). Through this “rational deconstruction,” our aim is to demonstrate that STRATUM captures notions that the designers of this strategy have reasoned about as they designed their strategy. Our aim is that this deconstructive exercise will help support our claims about the feasibility of the methodology and its consistency with current actual practice. Specifically, the analysis is based on SouthamptonTAC (He and Jennings, Citation2003), a trading agent developed at the University of Southampton, and one of the most successful agents in TAC2002.

We start with a brief description of TAC games.Footnote 7 In a TAC game, there are eight software agents that compete against each other in a variety of auctions to assemble travel packages for 64 customers (8 customers each). A package consists of (i) a round-trip flight during a 5-day period between TACtown and Tampa; and (ii) a stay at a particular hotel for every night between their arrival and departure. Customer satisfaction is measured in terms of utility, and each agent attempts to maximize its customers' utility, as measured against customer preference data that is randomly generated at the start of the game. Agents can also bid for the optional entertainment package, which can provide additional utility. There are different types of entertainment options. An individual game lasts 12 minutes and involves 28 auctions. Each component in a package is traded in a different type of auction:

Flights are sold in single seller auctions, for which the ask price is updated randomly every 24 to 32 seconds.

Hotels are traded in 16th price multi-unit English auctions. There are eight hotel auctions that close in random order at the end of every minute after the 4th. When a hotel auction clears, it allocates 16 rooms to agents that bid the 16 highest prices.

Entertainment tickets are randomly provided to agents, 12 tickets each, at the beginning of the game. Then agents can trade their tickets in a continuous double auction (CDA), where agents can buy and sell at any time before the game closes. Tickets are only useful to a customer if they are for different events, on different dates, and for nights when the customer is in town.

Designing bidding strategies for TAC auctions has proved to be a challenging problem. There are many interdependencies between different kinds of auctions (e.g., flights will be useless if the hotel rooms are not available) and within the same auction (e.g., having an extra ticket for the same entertainment is useless). This means that agents have to solve combinatorial optimization problems in a very short time (Eriksson and Janson, Citation2002). Moreover, there is an inherent uncertainty in the domain (e.g., since flight prices change randomly) and there is no way to predict precisely how other agents will behave.

Given this background, let us deconstruct SouthamptonTAC-02 based on STRATUM. Stage I (specifying objectives) is straightforward, since the objectives are explicitly stated in the form of the utility formula that takes into account complex customer preferences over flight, hotel, and entertainment combinations (see TAC, Citation2003, for details). Each agent attempts to maximize its overall utility based on the given customer's preferences.

Stage II (specifying capabilities) is again relatively simple. This is because the protocol allows relatively few dialogical capabilities. Agents have the ability C1 of making proposals in the form of bids according to the different auction protocol rules, the ability C2 to accept proposals in the entertainment CDAs, and the ability C5 to seek information from counterparts indirectly by observing their bidding behavior. Finally, agents have the ability C11 (do nothing) by simply not making any bids. Agents are not allowed to leave the game before it is over or enter the game after it starts. Moreover, agents have no external non-dialogical abilities that may influence their dialogical abilities.

The authors of SouthamptonTAC-02 invested a significant effort into Stage III (constructing the Environment Model). In the authors' own words: “Our post hoc analysis of the TAC2001 competition shows that an agent's performance depends heavily on the risk attitude of its opponents” (He and Jennings, Citation2003, p. 221).

This marks an explicit recognition by the authors of the importance of modeling the negotiation environment (or, more precisely, peer agents in the environment). To this end, the authors identify three types of environments, based on the prices of hotels: (i) competitive environments where the prices of the hotels are very high, (ii)noncompetitive environments where agents can get cheap hotel rooms, and (iii) semicompetitive environments, which are in between. Environment type recognition is performed by monitoring the hotel prices during the game. Recognition is based on fuzzy pattern recognition techniques, which classify the environment based on the degrees of membership of the asking price in the fuzzy sets representing the three environment types mentioned above.

Note that the authors did not use the prices of entertainment tickets or flight tickets as a measure of competition. This is because they have observed that flight prices and entertainment tickets prices are similar whether the game is competitive or non-competitive. It is the hotel closing prices that identify the nature of the opponents.Footnote 8

Let us now move to Stage IV (constructing tactics and strategies). Given the limited number of dialogical abilities allowed, tactics in TAC are mainly characterized by the following two families: seeking to delay and seeking fast termination. In other words, tactics are mainly time dependent. The precise way in which agents delay or speed up their buying and selling, and the reasons for doing so (e.g., based on price prediction), are what constitute TAC strategies.

The authors begin with the main objective in mind: to maximize the utility. Then, they divide this objective into the following subobjectives: (i) predicting the hotel closing prices; (ii) allocating flights, hotels, and entertainment tickets obtained to the eight customers so that utility is maximized; (iii) deciding when to bid in the flights auctions; (iv) deciding what entertainment tickets to buy and sell in the continuous double auctions; and (v) deciding what hotel auction to bid in and at what price (He, Citation2004).

Note that objectives (i) and (ii) above are not dialogical objectives since they involve internal calculations by the agent rather than interaction with other agents. The first objective is achieved using fuzzy rules, while the second is achieved using an integer and linear programming solver. Among the three remaining objectives, our interest in the remainder of this section is in the strategy used to achieve objective (iii) for deciding when to bid for flight tickets.

Based on observations during the earlier TAC-01 competition, the authors of SouthamptonTAC-02 recognized the need for adapting to the different types of environments described above. The authors characterize a risk-averse (RA) tactic as one where the agent buys a small number of flight tickets at the beginning of the game and bids for hotels according to the situation as the game progresses. A risk-seeking (RS) tactic, on the other hand, is one where the agent buys a large number of flight tickets at the beginning of the game and therefore does not change its customers' travel plans often during the game. The authors state the following observation about the risk-averse tactic, based on their experience in TAC2001:

a risk-averse agent…is highly flexible and copes well when there is a significant degree of competition and the hotel prices are high .…In this way, it avoids buying extra hotels which cost extra money. Also, the agent can receive optimal utility by not shortening the stay of its customers. (He and Jennings, Citation2003, p. 221, 226)

The authors also make the following observation about the risk-seeking strategy:

a risk-seeking agent…does well in environments in which hotels are cheap. For example, when a hotel price goes up sharply, a risk-averse agent would stop bidding on that hotel (changing the stay to a counterpart hotel or reducing the trip period). In contrast, a riskseeking agent will insist on bidding for that hotel, although the price is very high. In so doing, it hopes that the price will eventually stabilise (hence the risk)…[It] is highly effective in noncompetitive environments…because there is little competition in hotel bidding and the agent can always obtain what it wants. (He and Jennings, Citation2003, p. 222, 226)

It is possible to characterize the above observations, which guided the design of the SouthamptonTAC-02 strategy, using STRATUM tactic templates. The risk-averse and risk-seeking tactics are encoded in Tables and , respectively.

TABLE 4 Risk-Averse Tactic Specification

TABLE 5 Risk-Seeking Tactic Specification

Stage IV of strategy design does not stop here. The authors make the following additional observation:

After our experiences in TAC-01, we came to believe that there is no single best strategy that can deal with all the different types of TAC environment. For example, a risk-seeking agent…is highly effective in noncompetitive environments. This is because there is little competition in hotel bidding and the agent can always obtain what it wants. On the other hand, delaying buying flights and shortening the stay of customersFootnote 9 works well in competitive games. For this reason, SouthamptonTAC dynamically varies its bidding strategy according to its assessment of the environment type. (He and Jennings, Citation2003, p. 226)

Based on this observation, SouthamptonTAC-02 uses a composed strategy that makes use of the risk-seeking and risk-averse tactics as well as a medium-risk tactic in semicompetitive environments.Footnote 10 This can be characterized in the STRATUM strategy template shown in Table .

TABLE 6 SouthamptonTAC-02 Adaptive Strategy

Finally, for Stage V (testing and refinement), SouthamptonTAC-02 strategy testing has been mainly based on simulation. The authors set up a number of controlled experiments in their lab. In particular, they simulated games in which different combinations of SouthamptonTAC-02, risk-averse and risk-seeking agents played (among 8 participants). They showed that SouthamptonTAC-02 does best in competitive games, where the number of RS agents is big. The agent also does well in noncompetitive environments, where there are many RA-agents. It turns out that the worst situation for SouthamptonTAC-02 is when all players are like itself; i.e., they are all adaptive. This is due to the fact that all agents switch their strategies (i.e., adapt) at the same time, causing competition to be instantaneously shifted or prices to fluctuate constantly.

Further empirical results were obtained in the actual TAC2002 competition. TAC2002 results showed that SouthamptonTAC-02 was ranked second, with a difference of 0.8% from the top scoring agents. However, since each game involves a wide variety of agents, it is difficult to draw strong comparative results, such as whether the adaptive strategy made a real difference.

In terms of strategy refinement that took place before the actual competition, the authors denote that it was due to empirical testing through controlled experiments that they discovered the need for modeling the environment (He, Citation2004). This is what led them to using the fuzzy-logic-based method for modeling the environment's competitiveness. The authors also indicated that their future work includes improving the fuzzy modeling and pattern matching techniques (He and Jennings, Citation2004).

One possible future refinement could be to attempt to deal with the problem that arises when multiple identical adaptive agents populate the game. In such cases, adding some randomness to the timing of agent's adaptation (e.g., by allowing an agent to switch its strategy before others do) might enable an agent to overcome the problem mentioned above. Another refinement suggestion is to include other factors when modeling the environment. For example, instead of considering hotel prices as the only measure of environment competitiveness, the strategy designers may take account of competitors' bidding behavior in entertainment and travel auctions.

Case Study 2: Interest-Based Negotiation

Interest-based negotiation (IBN) (Rahwan, Citation2004) is a type of argumentation-based negotiation frameworks (Rahwan et al., Citation2003b). We begin by giving a brief overview of IBN before we discuss how STRATUM may be applied to it.

The idea behind IBN is that in addition to exchanging proposals, acceptance, and rejection messages, agents can also exchange information about their underlying goal structures and use this information in order to discover better deals. The IBN framework assumes agents are built using a deliberative architecture where they have beliefs about the environment and capabilities that define what non-dialogical actions they can perform. Agents have desire generation rules of the form , which means that if condition C is satisfied, then the agent will desire to achieve φ. Using desire generation rules, an agent can generate explanatory arguments (Amgoud and Kaci, Citation2005) by which they conclude which desires to adopt. Planning rules, on the other hand, are expressions of the form φ1 ∧…∧ φ n φ and mean that if φ1,…, φ n are achieved, then φ is achieved. Using planning rules, an agent can generate plans (or instrumental arguments) for achieving different desires. These plans have a hierarchical (tree) structure in which the root node is a desire, all other nodes are goals that are instrumental toward achieving the desire, and leaf nodes represent the resources required to execute the plan (i.e., required non-dialogical capabilities). The relationship between beliefs, desires, goals, and resources is depicted in Figure .

FIGURE 5 Relationships between attitudes.

FIGURE 5 Relationships between attitudes.

Agents calculate the utilities of different plans based on the plans' costs and the values of the desires they achieve, resulting in a preference ordering over different plans. As agents receive new information from the environment or other agents, their existing arguments may be defeated, resulting in change in their preference. An argumentation-based semantics is given that specifies how preference changes occur.Footnote 11

The IBN protocol provides a way for agents to exchange information about their goal structures and to exchange arguments that can alter these goal structures. Locutions PROPOSE(.), ACCEPT(.) and REJECT(.) allow agents to propose, accept and reject deals, respectively. The locution ASSERT(.) allows an agent to make assertions about its own beliefs, goals, sub-goals, or planning rules. Agents can ask one another for information through the locutions QUESTION(.), which allows an agent to ask another to state whether it agrees with a particular expression, and CHALLENGE(.), which allows an agent to ask another for a justification of a particular asserted belief or desire. The locution RETRACT(.) enables agents to retract previously asserted statements and proposed deals.

Note that locution CHALLENGE(.) allows agents to either ask for arguments (i.e., tentative proofs) that justify a particular “belief” or ask for explanatory arguments that justify a particular “desire.” This cannot be used to ask for arguments supporting goals that are part of instrumental arguments. This is because a goal is adopted both because it is instrumental toward a higher level goal or desire and because it is achievable through some lower level goals or capabilities. For this purpose, there are two additional locutions that enable agents to ask for arguments supporting goals. Locution REQ-PURPOSE(.) allows an agent to ask another for the higher level purpose of a particular request (e.g., “Why do you need to travel?”). A similar locution REQ-ACHIEVE(.) allows an agent to ask another for the sub-plan that is meant to achieve the goal in question (e.g., “How do you intend to book your ticket?”).

The framework also has additional special predicates to use within the locutions. The predicate prule(.) is used to exchange planning rules among agents. Another predicate instr(X, Y) is used by one agent to indicate that goals X are adopted because they are instrumental toward achieving higher level goals Y. Predicates des(.), bel(.), and int(.) denote the desire, belief, and intention modalities, respectively.

Finally, the framework uses so-called commitment stores (Walton and Krabbe, Citation1995). Each agent i has its own commitment store (i), which stores commitments that follow from different utterances made by that agent. For example, when an agent makes an assertion, this assertion is inserted into its commitment store. This enables other agents to later question or challenge these assertions. Also, when a proposal is made, a conditional intention is inserted into the proposer's commitment store. The conditional intention states that if the counterpart agrees on its part of the deal, then the proposer is committed to intending its own part.

Stage I of the STRATUM methodology requires identifying the agent's objectives in the negotiation. Objectives are specified explicitly in the IBN framework, making the OM easy to document. Each agent attempts to achieve a set of desires and tries to reach a deal that maximizes the utility it receives (calculated as the difference between the worth of desires achieved and the cost of the actions needed).Footnote 12

Stage II of the methodology requires defining the agent's capabilities, which constitute the CM. These are also explicitly specified already. In terms of the typology in Table , the IBN protocol presented in Rahwan (Citation2004) enables, in some form or another, all capabilities except C7 (exerting pressure on a counterpart). Agents can propose, accept, and reject deals; they can also make assertions, retract commitments, ask each other for information about each others' beliefs, or ask questions about how they may achieve certain goals or what a particular goal is useful for. They can also do nothing by uttering the PASS locution. Note, however, that the exact type of capability is somewhat restricted. For example, while an agent can request information about the counterpart's higher level and lower level goals (through the REQ-PURPOSE(.) and REQ-ACHIEVE(.) locutions) and about the counterpart's beliefs (using the QUESTION(.) and CHALLENGE(.) locutions), the agent is not able to ask the counterpart about the reason for believing a certain planning rule.

Moving to Stage III (constructing the environment model, EM), we first know that both agents use the same underlying reasoning mechanisms. This is an important assumption, since if the counterpart does not have an explicit representation of underlying goals, for example, then it does not make sense to ask that counterpart about the purpose of a particular request. In IBN, an explicit model of the counterpart is available at any time through its commitment stores. One may also attempt to guess other information about the counterpart by inferring its beliefs, goals, etc., from its utterances. This would benefit from the assumption that all agents have symmetric reasoning abilities. But for the purpose of this discussion, commitment stores are sufficient. Figure summarizes the mapping between the IBN framework and the first three models of the STRATUM methodology.

FIGURE 6 Methodology models mapped in IBN.

FIGURE 6 Methodology models mapped in IBN.

Stage IV involves defining tactics and strategies from capabilities in light of some decomposition of objectives. We now give an example of the kinds of analysis involved in Stage IV. Suppose we attempt to design a strategy for our seller agent A 1 to negotiate with another buyer agent A 2. As strategy designers, we would like to design a particular strategy that contributes to A 1's objective, and we want this strategy to be suitable for a situation where A 2 has already proposed some deal D to our agent, and that D is not acceptable to A 1. One way to achieve A 1's negotiation objective is to get A 2 to accept another deal D′ which is preferred by A 1. The most trivial strategy to achieve this is to offer D′ to A 2. This is clarified in the following typical bargaining dialogue:

If the above attempt fails, the only potential solution is to propose other alternative deals D″, D″′, etc. However, IBN enables alternative ways to reach a solution by providing agents with a wider set of dialogical abilities. Reasoning about how these dialogical capabilities may influence the outcome requires an understanding of the effect of these capabilities on preferences. Knowing that in IBN both agents are assumed to have identical reasoning models, we can make the following observations about the counterpart:

  • A 2 might have rejected D′ because it has some goal g and it believes that D′ does not achieve g;

  • – If A 2 is persuaded that D′ does actually achieve g, then it might accept D′ (subject to other issues, such as the costs involved);

Hence, based on the above understanding of the counterpart, we can construct a strategy that attempts to persuade A 2 that D′ does indeed achieve its goal(s). But first, we need to explore how the IBN agent capabilities can be composed to achieve such persuasion. Given that A 1 has the ability C5 to seek information about the purpose of a resource requested by A 2, and to present new information about planning rules, we can construct the following pattern to persuade A 2 to accept D′:

  • A 1 finds out about a goal g that A 2 wants to achieve using resource r, which is part of deal D that A 2 requested;

  • A 1 then argues that D′ can also achieve goal g;

  • A 1 offers D′ to A 2;

This strategy can be described in STRATUM as shown in Table . The following dialogue sequence demonstrates how this strategy can be encoded in the IBN protocol:

TABLE 7 Description of an Example IBN Strategy

If the strategy works, the above dialogue will be followed by an acceptance from agent A 2 using the utterance ACCEPT(A 2, A 1, D′). The following is a natural language description of a dialogue that uses the above strategy.

In the above example, agent A 1 simply presents information about an alternative way of achieving the goal of going to Sydney. Whether A 2 accepts this alternative might depend on other issues, such as whether A 2 has petrol vouchers or whether A 2 wishes to visit a friend who lives on the way to Sydney. Therefore, a more aggressive strategy would be to try to make the driving alternative itself less appealing. As a result, this might make the flying option more preferable, hence increasing the likelihood of its acceptance. This new new approach can be described by the following pattern:

  • A 1 finds out about a goal g that A 2 wants to achieve using resource r, which is part of deal D that A 2 requested;

  • A 1 then argues that D′ can also achieve goal g;

  • A 1 persuades A 2 that its previous deal D does not achieve goal g;

  • A 1 offers D′ to A 2;

Note that this strategy is similar to strategy S1, except that it requires A 1 to persuade A 2 to abandon D. So before we specify the new strategy, we need to specify a tactic for achieving such persuasion. One way to do so is to show a “side effect” of D that was not known to A 1 before. This tactic is described in Table and is self-explanatory. We can now describe the new strategy by referring to tactic T1. This strategy is described in Table .

TABLE 8 Tactic Description of an IBN Tactic

TABLE 9 Description of an Example IBN Strategy

The following is an illustration of how strategy S2 can be encoded in the IBN protocol.

The following follow-up natural language dialogue illustrates the usage of the strategy:

The risk associated with strategy S2, as shown in Table , is clarified in the following variant of the above dialogue:

Finally, testing and refinement of the strategies is performed in State V. This stage on its own may require a separate study because of the richness of the protocol and the complexity of possible dialogue sequences. However, we shall briefly discuss some possible directions.

One option is to perform empirical testing through simulation. In argument-based negotiation, such types of studies have only been used for very simplistic dialogues (Jung et al., Citation2001; Karunatillake and Jennings, Citation2004; Ramchurn et al., Citation2003), where variations in parameters are relatively easy to enumerate (e.g., by varying the strength of threats and promises based on trust). The lack of extensive research in this area is largely due to the complexity of the protocol and the fact that no generic formal theory of argument-based interaction protocols exists. The STRATUM methodology has the potential to enable designers of multi-agent systems to follow a more systematic approach when enumerating variations of strategy within richer protocols.

The other option for analyzing IBN strategies is to perform theoretical analysis. This approach has been used to study simple strategies in persuasion dialogues (Amgoud and Maudet, Citation2002), as well as in inquiry and information seeking dialogues (Parsons et al., Citation2002), but not in negotiation dialogues as yet. Torroni (Citation2002) studies whether certain strategies lead to dialogue termination. The formal analysis is facilitated by the fact that the system is specified using abductive logic programs (Sadri et al., Citation2002). This enabled the analysis of dialogues in relation to the underlying well-understood proof theory. This type of formal analysis may not be as simple for the IBN framework, since many parts of the framework are described in a more or less “semantic” fashion (e.g., the generation of candidate intentions).

Discussion

The long-term objective of the research reported in this article is to bridge the gap between the theory and practice of automated negotiation. To this end, it is important to identify the domain-independent aspects of negotiating agent design in order to come up with general principles that can guide software engineers in building such agents.

The case studies above provide a hands-on feel for how the methodology can be applied. They also demonstrate how STRATUM can provide guidance to the process of strategy design in reasonably complex, and significantly different negotiation environments. The first case study shows that our methodology is consistent with current practice, since we were able to rationalize an existing TAC strategy using STRATUM. The second case study, on the other hand, shows that the same primitives and processes can be applied to design strategies for a very different type of negotiation environment, namely one that involves an expressive argumentation-based protocol.

The applicability of STRATUM in such significantly different domains demonstrates that the methodology's primitives and processes are sufficiently general to be applicable in a wide range of settings. In this context, we note that this wide applicability of STRATUM was facilitated by our deliberate choice to keep the methodology informal, rather than using a specific formal language.

We also believe the methodology has the potential to provide a common framework for comparison of strategies across negotiation frameworks, hence guiding designers in selecting appropriate strategies based on distilled domain characteristics. For example, the adaptive strategy described in case study 1 may be applicable in other domains where an agent is able to observe other agents' bidding behavior. Similarly, whenever the protocol enables agents to seek information about other agents' goals, strategy S1 (see Table ) may be applied in order to accelerate the process of finding a mutually acceptable deal. Hence, the article contributes to a vision discussed in an earlier paper:

…there are also a number of broader issues, which, to date, have received comparatively little attention. These include…the development of a best practice repository for negotiation techniques. That is, a coherent resource that describes which negotiation techniques are best suited to a given type of problem or domain (much like the way design patterns function in object-oriented analysis and design). (Jennings et al., Citation2001, p. 212)

CONCLUSION AND FUTURE WORK

We have presented the STRATUM methodology for guiding the design of agent negotiation strategies. STRATUM is the first attempt to structure the process of strategy construction in non-game-theoretic domains (i.e., in domains where the nature of the protocol and the limited information available make it impossible to prescribe optimal strategies through mechanism design techniques (Dash et al., Citation2003). We demonstrated how the methodology can be used through two case studies. Moreover, we believe there is nothing in our model that is specific to one type of negotiation framework and so we believe it is generic. However, additional studies are needed to better understand and confirm the scope of applicability of the approach.

The hierarchical construction of strategies becomes particularly useful for designers of strategies for rich negotiation dialogues, where agents have a large number of possible utterances (and hence, dialogical abilities) that they can use. This is because STRATUM enables designers to reason about the objectives of a negotiation strategy as a planning problem. This view of dialogue is consistent with the plan-based theory of speech acts proposed by Cohen and Perrault (Citation1979), which suggests that a “planning” view is an adequate way to capture the way people reason about their utterances.

It is worth noting that it may be possible to exploit the hierarchical structure of objectives and strategies in order enable agents to compose strategies at run time. In fact, this is exactly what SouthamptonTAC-02 does, since it varies its underlying tactic based on observations of the environment. In more complex dialogues, this would require the dependencies between objectives and tactics on different levels to be represented formally in a way that can be processed by a computer program. Then the reasoning required may be made possible using a hierarchical task planner (Erol et al., Citation1994). This would enable agents to modify their strategies, or even their objectives, during negotiation. For example, an agent might abandon an objective or a tactic if the agent perceives that this objective or tactic is not currently achievable or is counterproductive because the negotiation counterpart is resistant to it. As with any other intentions, the defeasibility of objectives in a computational agent requires some formal mechanism for intention-reconsideration (Schut and Wooldridge, Citation2001).

We are grateful to Minghua He for providing us with details on the SouthamptonTAC-02 strategy. During this work, Iyad Rahwan was partially supported by a Melbourne Research Scholarship (MRS) from the University of Melbourne. The general structure of the methodology and the characterization of negotiation capabilities arose from discussions between Peter McBurney and Iyad Rahwan while the latter was a visitor at the Department of Computer Science, the University of Liverpool, UK, funded by a Melbourne University PORES award. Peter McBurney acknowledges partial financial support from the European Commission under Project ASPIC (IST-FP6-002307).

Notes

Rational in the sense that they try to maximize their expected utilities, that their preferences satisfy certain axiomatic conditions, and that their decisions assume that other agents are also rational.

Some work has been done on calculating equilibrium strategies while taking into account the cost of computation (Larson and Sandholm, Citation2001). However, this approach has been applied to a particular, relatively simple bilateral bargaining setting, and it is not clear yet how this approach generalizes to more complex negotiations (e.g., involving multiple concurrent negotiations).

The name illustrates that this methodology does not follow the traditional game-theoretic approach. The word stratum is the singular of strata (a set of layers) and refers to the compositional construction of strategies from simple tactics and capabilities.

This hierarchical objectives structure has a structural similarity to the landmarks theory of conversation protocols of Kumar et al. (Citation2002). However, our approach concerns only the objectives of an individual agent and not the joint goals of all participants to an interaction.

When describing the negotiation objectives and strategies, we use the terms “objective” and “subobjective” deliberately in order to distinguish them from the agent's own internal “goals” and “sub-goals.”

In the latter case, the template above would be referred to as a strategy template.

For the interested reader, Greenwald (Citation2003) provides a comprehensive description.

Based on personal communication with the designers of Southampton TAC-02 (He, Citation2004).

That is, a risk-averse behavior.

In this tactic, the agent buys most of the flights earlier and will only change travel plans if a significant improvement can be obtained.

For brevity, we do not present the full specification of the argumentation system used. The interested reader may refer to Rahwan (Citation2004).

Note that this uses a different, and simpler, formula to the one used in TAC.

Of course, this dialogue assumes that A 1 prefers to sell a ticket for $250 than hire out a car for $400.

REFERENCES

  • Amgoud , L. and S. Kaci . 2005 . On the generation of bipolar goals in argumentation-based negotiation . In: Argumentation in Multi-Agent Systems: (Proceedings of the First International Workshop (ArgMAS'04): Expanded and Invited Contributions). Vol. 3366 of Lecture Notes in Computer Science , eds. I. Rahwan , P. Moraitis , and C. Reed , Berlin : Springer Verlag .
  • Amgoud , L. and N. Maudet . 2002 . Strategical considerations for argumentative agents (preliminary report) . In: Proceedings of the 9th International Workshop on Non-Monotonic Reasoning (NMR 2002): Special Session on Argument, Dialogue and Decision , eds. S. Benferhat , and E. Giunchiglia . Toulouse , France : IRIT .
  • Ashri , R. , I. Rahwan , and M. Luck . 2003 . Architectures for negotiating agents . In: Multi-Agent Systems and Applications III: Proceedings of the 3rd International Central and Eastern European Conference on Multi-Agent Systems (CEEMAS 2003) . Vol. 2691 of Lecture Notes in Artificial Intelligence , eds. by V. Marik , J. Miller , and M. Pechoucek , Berlin : Springer Verlag .
  • Bartolini , C. , C. Preist , and N. R. Jennings . 2002 . Architecting for reuse: A software framework for automated negotiation . In: Proceedings of the 3rd International Workshop on Agent-Oriented Software Engineering (AOSE-2002) , eds. F. Giunchiglia , J. Odell , and G. Weiss , Berlin : Springer Verlag .
  • Bauer , B. , J. Müller , and J. Odell . 2001 . Agent UML: A formalism for specifying multiagent interaction . In: Agent-Oriented Software Engineering . Vol. 1957 of Lecture Notes in Computer Science , eds. P. Ciancarini , and M. Wooldridge , Berlin : Springer Verlag .
  • Billington , D. 1993. Defeasible logic is stable. Journal of Logic and Computation 3:370–400.
  • Binmore , K. and N. Vulkan . 1997 . Applying game theory to automated negotiation . In Proceedings of the DIMACS Workshop on Economics, Game Theory and the Internet . New Brunswick , N.J. Rutgers University .
  • Boella , G. and L. van der Torre . 2004 . Groups as agents with mental attitudes . In: Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS) , eds. N.R. Jennings , C. Sierra ; L. Sonenberg , and M. Jambe . Washington , D.C. : IEEE Computer Society .
  • Bresciani , P. , A. Perini , P. Giorgini , F. Giunchiglia , and J. Mylopoulos . 2004 . Tropos: An agent-oriented software development methodology . Autonomous Agents and Multi-Agent Systems 8 ( 3 ): 203 – 236 .
  • Camerer , C. F. 2003 . Behavioral Game Theory: Experiments in Strategic Interaction . Princeton , N.J. : Princeton University Press .
  • Cohen , P. R. and C. R. Perrault . 1979 . Elements of a plan-based theory of speech acts . Cognitive Science 3 ( 1 ): 177 – 212 .
  • Dash , R. K. , D. C. Parkes , and N. R. Jennings . 2003 . Computational mechanism design: A call to arms . IEEE Intelligent Systems 18 ( 6 ): 40 – 47 .
  • Dignum , V. 2004 . A model for organizational interaction: Based on agents, founded in logic . Ph.D. thesis, Institute of Information and Computing Sciences , Utrecht University , The Netherlands .
  • d'Inverno , M. and M. Luck . 2001 . Understanding Agent Systems . Heidelberg : Springer Verlag .
  • Dumas , M. , G. Governatory , A. H. M. ter Hofstede , and P. Oaks . 2002 . A formal approach to negotiating agent development . Electronic Commerce Research and Applications 1 ( 2 ): 193 – 207 .
  • Dunne , P. E. 2003 . Prevarication in dispute protocols . In: Proceedings of the 9th International Conference on AI and Law (ICAIL) , eds. G. Sartor , New York ; ACM Press .
  • Eriksson , J. and S. Janson . 2002 . The trading agent competition—TAC 2002 . ERCIM News 51 : 57 – 58 .
  • Erol , K. , J. Hendler , and D. Nau . 1994 . Semantics for hierarchical task network planning . Technical Report CS-TR-3239, UMIACS-TR-94-31, Department of Computer Science, University of Maryland .
  • Faratin , P. 2000 . Automated service negotiation between autonomous computational agents . Ph.D. thesis, University of London, Queen Mary and Westfield College, Department of Electronic Engineering .
  • Fatima , S. , M. J. Wooldridge , and N. R. Jennings . 2001 . Optimal negotiation strategies for agents with incomplete information . In: Intelligent Agent Series VIII: Proceedings of the 8th International Workshop on Agent Theories, Architectures, and Languages (ATAL 2001) . Vol. 2333 of Lecture Notes in Computer Science , eds. J.-J. Meyer and M. Tambe , Berlin : Springer Verlag .
  • Fatima , S. , M. J. Wooldridge , and N. R. Jennings . 2002 . Multi-issue negotiation under time constraints . In: Proceedings of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-2002) , eds. C. Castelfranchi and L. Johnson , New York : ACM Press .
  • Fatima , S. , M. J. Wooldridge , and N. R. Jennings . 2005 . Bargaining with incomplete information . Annals of Mathematics and Artificial Intelligence 44 ( 3 ): 207 – 232 .
  • Foundation for Intelligent Physical Agents (FIPA) . 2001 . Communicative Act Library Specification . Technical Report XC00037H , Foundation for Intelligent Physical Agents , USA .
  • Fisher , R. , W. Ury , and B. Patton . 1991 . Getting to Yes: Negotiating Agreement without Giving In. , 2nd ed. New York : Penguin Books .
  • Fritschi , C. and K. Dorer . 2002 . Agent-oriented software engineering for successful TAC participation . In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems , Bologna, Italy , eds. C. Castelfranchi and W.L. Johnson . New York : ACM Press .
  • Gal , Y. and A. Pfeffer . 2003 . A language for opponent modeling in repeated games . In: Proceedings of the 5th Workshop on Game Theoretic and Decision Theoretic Agents (GTDT-2003) , eds. S. Parsons and P. Gmytrasiewicz , Melbourne , Australia .
  • Greenwald , A. 2003 . The 2002 trading agent competition: An overview of agent strategies . AI Magazine 24 ( 1 ): 83 – 91 .
  • Harel , D. and A. Naamad . 1996 . The STATEMATE semantics of statecharts . ACM Transactions on Software Engineering and Methodology 5 ( 4 ): 293 – 333 .
  • Harsanyi , J. C. 1956 . Approaches to the bargaining problem before and after the theory of games: A critical discussion of Zeuthen's, Hicks', and Nash's theories . Econometrica 24 : 144 – 157 .
  • He , M. 2004 . Personal communication in person and via e-mail .
  • He , M. and N. R. Jennings . 2003 . SouthamptonTAC: An adaptive autonomous trading agent . ACM Transactions on Internet Technology 3 ( 3 ): 218 – 235 .
  • He , M. and N. R. Jennings . 2004 . Designing a successful trading agent using fuzzy techniques . IEEE Transaction on Fuzzy Systems 12 ( 3 ): 389 – 410 .
  • He , M. , H. Leung , and N. R. Jennings . 2003. A fuzzy logic based bidding strategy for autonomous agents in continuous double auctions. IEEE Transaction on Knowledge and Data Engineering 15(6):1345–1363.
  • Jennings , N. R. 2001 . An agent-based approach for building complex software sysems . Communications of the ACM 44 ( 4 ): 35 – 41 .
  • Jennings , N. R. , P. Faratin , A. R. Lomuscio , S. Parsons , C. Sierra , and M. J. Wooldridge . 2001 . Automated negotiation: Prospects, methods and challenges . International Journal of Group Decision and Negotiation 10 ( 2 ): 199 – 215 .
  • Jennings , N. R. and M. J. Wooldridge . 1998 . Applications of intelligent agents . In: Agent Technology: Foundations, Applications, and Markets , eds. N. R. Jennings , and M. J. Wooldridge , Heidelberg : Springer Verlag .
  • Juan , T. , A. Pearce , and L. Sterling . 2002 . ROADMAP: Extending the Gaia methodology for complex open systems . In: Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2002) , eds. C. Castelfranchi , and W. L. Johnson , New York : ACM Press .
  • Jung , H. , M. Tambe , and S. Kulkarni . 2001 . Argumentation as distributed constraint satisfaction: Applications and results . In: Proceedings of the Fifth International Conference on Autonomous Agents , eds. J. P. Müller , E. Audre , S. Sen , and C. Frasson , New York : ACM Press .
  • Karunatillake , N. C. and N. R. Jennings . 2004 . Is it worth arguing? In: Argumentation in Multi-Agent Systems, First International Workshop, ArgMAS 2004, Revised Selected and Invited Papers . Vol. 3366 of Lecture Notes in Computer Science , eds. I. Rahwan , P. Moraitis , and C. Reed . Heidelberg : Springer Verlag .
  • Kowalczyk , R. and V. Bui . 2001 . On constraint-based reasoning in e-negotiation agents . In: Agent-Mediated Electronic Commerce III . Vol. 2003 of Lecture Notes in Computer Science , eds. F. Dighum , and U. Cortes . Berlin : Springer Verlag .
  • Kraus , S. 2001 . Strategic Negotiation in Multi-Agent Environments . Cambridge , MA : MIT Press .
  • Kraus , S. , K. Sycara , and A. Evenchik . 1998 . Reaching agreements through argumentation: A logical model and implementation . Artificial Intelligence 104 ( 1–2 ): 1 – 69 .
  • Kumar , S. , M. J. Huber , and P. R. Cohen . 2002 . Representing and executing protocols as joint actions . In: Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2002) , eds. C. Castelfranchi , and W. L. Johnson , New York : ACM Press .
  • Kungas , P. and J. Rao . 2004 . Symbolic agent negotiation for semantic web service exploitation . In: Advances in Web-Age Information Management, 5th International Conference, WAIM 2004 . Vol. 3129 of Lecture Notes in Computer Science , eds. Q. Li , C. Wanga , and L. Feng , Berlin : Springer Verlag .
  • Larson , K. and T. Sandholm . 2001 . Bargaining with limited computation: Deliberation equilibrium . Artificial Intelligence 132 : 183 – 217 .
  • Lewicki , R. J. , D. M. Saunders , and J. W. Minton . eds. 2003 . Essentials of Negotiation . Boston : McGraw-Hill .
  • Lilien , G. L. , P. Kotler , and S. K. Moorthy . 1992 . Marketing Models . Upper Saddle River , NJ : Prentice-Hall Press .
  • Luck , M. , P. McBurney , and C. Preist . 2003 . Agent Technology: Enabling Next Generation Computing (A Roadmap for Agent Based Computing) . Southampton , UK : AgentLink .
  • Maudet , N. and B. Chaib-draa . 2003 . Commitment-based and dialogue-game based protocols—New trends in agent communication language . Knowledge Engineering Review 17 ( 2 ): 157 – 179 .
  • McKeown , K. R. 1985 . Text Generation: Using Discourse Strategies and Focus Constraints to Generate Natural Language Text . Cambridge , UK : Cambridge University Press .
  • Milch , B. and D. Koller . 2000 . Probabilistic models for agents' beliefs and decisions . In: Proceedings of the 16th Annual Conference on Uncertainty in AI (UAI-2000) , Stanford, CA, USA , eds. C. Boutilier and M. Goldszmidt , San Francisco , CA : Morgan Kaufmann .
  • Padgham , L. and M. Winikoff . 2004 . Developing Intelligent Agent Systems: A Practical Guide . New York : John Wiley & Sons .
  • Parsons , S. , C. Sierra , and N. Jennings . 1998 . Agents that reason and negotiate by arguing . Journal of Logic and Computation 8 ( 3 ): 261 – 292 .
  • Parsons , S. , M. J. Wooldridge , and L. Amgoud . 2002 . An analysis of formal inter-agent dialogues . In: Proceedings of the 1st International Joint Conference on Autonomous Agents and MultiAgent Systems (AAMAS-2002) , eds. C. Castelfranchi , and L. Johnson , New York : ACM Press .
  • Parunak , H. V. D. P. 1999 . Industrial and practical applications of DAI . In: Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence , ed. G. Weiss , Cambridge , Mass. : MIT Press .
  • Rahwan , I. 2004. Interest-based negotiation in multi-agent Systems . Ph.D. thesis, Department of Information Systems, University of Melbourne , Melbourne , Australia.
  • Rahwan , I. , P. McBurney , and L. Sonenberg . 2003 . Towards a theory of negotiation strategy (a preliminary report) . In: Proceedings of the 5th Workshop on Game Theoretic and Decision Theoretic Agents (GTDT 2003) , Melbourne , Australia , eds. S. Parsons , and P. Gmytrasiewicz .
  • Rahwan , I. , S. D. Ramchurn , N. R. Jennings , P. McBurney , S. Parsons , and L. Sonenberg . 2003 . Argumentation based negotiation . Knowledge Engineering Review 18 ( 4 ): 343 – 375 .
  • Rahwan , I. , L. Sonenberg , and F. Dignum . 2003 . Towards interest-based negotiation . In: Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2003) , Melbourne, Australia , eds. J. Rosenschein , T. Sandholm , M. J. Wooldridge , and M. Yokoo , New York : ACM Press .
  • Ramchurn , S. D. , N. R. Jennings , and C. Sierra . 2003 . Persuasive negotiation for autonomous agents: A rhetorical approach . In: Proceedings of the IJCAI Workshop on Computational Models of Natural Argument , Acapulco, Mexico , eds. C. Reed , F. Grasso , and G. Carenini , AAAI Press .
  • Roberts , J. H. and J. M. Lattin . 1991 . Development and testing of a model of consideration set composition . Journal of Marketing Research 28 ( 4 ): 429 – 440 .
  • Rosenschein , J. and G. Zlotkin . 1994 . Rules of Encounter: Designing Conventions for Automated Negotiation among Computers . Cambridge , Mass .: MIT Press .
  • Sadri , F. , F. Toni , and P. Torroni . 2001 . Logic agents, dialogues and negotiation: An abductive approach . In: Proceedings of the AISB 2001 Symposium on Information Agents for E-Commerce , York , UK , eds. K. Stathis , and M. Schroeder .
  • Sadri , F. , F. Toni , and P. Torroni . 2002 . Abductive logic programming architecture for negotiating agents . In: Proceedings of the 8th European Conference on Logics in Artificial Intelligence (JELIA-2002) , eds. S. Flesca , S. Greco , N. Leone , and G. Ianni , Vol. 2424 of Lecture Notes in Computer Science , Berlin : Springer Verlag .
  • Sandholm , T. 2002 . eMediator: A next generation electronic commerce server . Computational Intelligence, Special issue on Agent Technology for Electronic Commerce 18 ( 4 ): 656 – 676 .
  • Sandholm , T. and V. Lesser . 2002 . Leveled commitment contracting: A backtracking instrument for multiagent systems . Artificial Intelligence Magazine 23 ( 3 ): 89 – 100 .
  • Schut , M. and M. Wooldridge . 2001 . The control of reasoning in resource-bounded agents . Knowledge Engineering Review 16 ( 3 ): 215 – 240 .
  • Sierra , C. , N. R. Jennings , P. Noriega , and S. Parsons . 1998 . A framework for argumentation-based negotiation . In: Intelligent Agent IV: 4th International Workshop on Agent Theories, Architectures and Languages (ATAL-1997) . Vol. 1365 of Lecture Notes in Artificial Intelligence , eds. M. Singh , A. Rao , and M. J. Wooldridge , Berlin : Springer Verlag .
  • TAC . 2003. The Trading Agent Competition. http://www.sics.se/tac/. Accessed 1 July 2006 .
  • Tambe , M. , E. Bowring , H. Jung , G. Kaminka , R. Maheswaran , J. Marecki , P. J. Modi , R. Nair , S. Okamoto , J. P. Pearce , P. Paruchuri , D. Pynadath , P. Scerri , N. Schurr , and P. Varakantham . 2005 . Conflicts in teamwork: Hybrids to the rescue . In: AAMAS '05: Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems , eds. F. Dignum , V. Dignum , S. Koenig , S. Kraus , M.P. Singh , and M. Woolridge , New York : ACM Press .
  • Torroni , P. 2002 . A study on the termination of negotiation dialogues . In: Proceedings of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-2002) eds. C. Castelfranchi , and L. Johnson , New York : ACM Press .
  • von Stengel , B. 2002 . Computing equilibria for two-person games . In: Handbook of Game Theory , eds. R. Aumann , and S. Hart , Vol. 3 , Ch. 45 , Amsterdam , The Netherlands : Elsevier Science Publishers .
  • Walton , D. N. and E. C. W. Krabbe . 1995 . Commitment in Dialogue: Basic Concepts of Interpersonal Reasoning . Albany , N.Y. : SUNY Press .
  • Wooldridge , M. , N. R. Jennings , and D. Kinny . 2000 . The Gaia methodology for agent-oriented analysis and design . Autonomous Agents and Multi-Agent Systems 3 ( 3 ): 285 – 312 .
  • Wooldridge , M. J. 2002 . An Introduction to MultiAgent Systems . Chichester , England : John Wiley & Sons .
  • Young , M. A. 2001 . Rational Games: A Philosophy of Business Negotiation from Practical Reason . Westport , Conn. : Quorum Books .
  • Zambonelli , F. , N. R. Jennings , and M. Wooldridge . 2003 . Developing multiagent systems: The Gaia methodology . ACM Transactions on Software Engineering and Methodology 12 ( 3 ): 317 – 370 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.