{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T20:01:39Z","timestamp":1773172899173,"version":"3.50.1"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T00:00:00Z","timestamp":1773100800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T00:00:00Z","timestamp":1773100800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100020957","name":"Universidade Tecnol\u00f3gica Federal Do Paran\u00e1","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100020957","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10458-026-09741-z","type":"journal-article","created":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T01:52:54Z","timestamp":1773107574000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A task delegation model: An approach based on trustworthiness in sub-delegations and delegation chain formation"],"prefix":"10.1007","volume":"40","author":[{"given":"Jeferson Jos\u00e9","family":"Baqueta","sequence":"first","affiliation":[]},{"given":"Cesar Augusto","family":"Tacla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,10]]},"reference":[{"issue":"4","key":"9741_CR1","doi-asserted-by":"publisher","first-page":"303","DOI":"10.3233\/AIC-190616","volume":"32","author":"J Afanador","year":"2019","unstructured":"Afanador, J., Baptista, M. S., & Oren, N. (2019). Algorithms for recursive delegation. AI Communications., 32(4), 303\u2013317.","journal-title":"AI Communications."},{"key":"9741_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/9780470519851","volume-title":"Trust Theory: A Socio-cognitive and Computational Model","author":"C Castelfranchi","year":"2010","unstructured":"Castelfranchi, C., & Falcone, R. (2010). Trust Theory: A Socio-cognitive and Computational Model (Vol. 18). United Kingdom: John Wiley & Sons."},{"key":"9741_CR3","doi-asserted-by":"crossref","unstructured":"Karimadini, M., & Lin, H. (2010). Synchronized task decomposition for two cooperative agents. In 2010 IEEE Conference on Robotics, Automation and Mechatronics, pp. 368\u2013373. IEEE.","DOI":"10.1109\/RAMECH.2010.5513167"},{"issue":"8","key":"9741_CR4","doi-asserted-by":"publisher","first-page":"6704","DOI":"10.1109\/JIOT.2020.2993216","volume":"7","author":"L Xing","year":"2020","unstructured":"Xing, L. (2020). Reliability in internet of things: Current status and future perspectives. IEEE Internet of Things Journal., 7(8), 6704\u20136721.","journal-title":"IEEE Internet of Things Journal."},{"key":"9741_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.jnca.2017.04.007","volume":"88","author":"EJ Ghomi","year":"2017","unstructured":"Ghomi, E. J., Rahmani, A. M., & Qader, N. N. (2017). Load-balancing algorithms in cloud computing: A survey. Journal of Network and Computer Applications., 88, 50\u201371.","journal-title":"Journal of Network and Computer Applications."},{"key":"9741_CR6","doi-asserted-by":"crossref","unstructured":"Manavalan, E., & Jayakrishna, K. (2019). A review of internet of things (iot) embedded sustainable supply chain for industry 4.0 requirements. Computers & Industrial Engineering,127, 925\u2013953.","DOI":"10.1016\/j.cie.2018.11.030"},{"issue":"9","key":"9741_CR7","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1016\/j.future.2018.04.051","volume":"86","author":"M Abdel-Basset","year":"2018","unstructured":"Abdel-Basset, M., Manogaran, G., & Mohamed, M. (2018). Internet of things (iot) and its impact on supply chain: A framework for building smart, secure and efficient systems. Future Generation Computer Systems., 86(9), 614\u2013628.","journal-title":"Future Generation Computer Systems."},{"key":"9741_CR8","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.ijpe.2018.06.008","volume":"204","author":"JT Margolis","year":"2018","unstructured":"Margolis, J. T., Sullivan, K. M., Mason, S. J., & Magagnotti, M. (2018). A multi-objective optimization model for designing resilient supply chain networks. International Journal of Production Economics., 204, 174\u2013185.","journal-title":"International Journal of Production Economics."},{"key":"9741_CR9","doi-asserted-by":"crossref","unstructured":"Cui, Y., Idota, H., & Ota, M.: Improving supply chain resilience with implementation of new system architecture. In 2019 IEEE Social Implications of Technology (SIT) and Information Management (SITIM), pp. 1\u20136 (2019). IEEE.","DOI":"10.1109\/SITIM.2019.8910226"},{"key":"9741_CR10","doi-asserted-by":"crossref","unstructured":"Wong, C., Yang, E., Yan, X.-T., & Gu, D. (2017). An overview of robotics and autonomous systems for harsh environments. In 2017 23rd International Conference on Automation and Computing (ICAC), pp. 1\u20136. IEEE.","DOI":"10.23919\/IConAC.2017.8082020"},{"issue":"4","key":"9741_CR11","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/JMASS.2021.3083659","volume":"2","author":"J Dong","year":"2021","unstructured":"Dong, J., Ota, K., & Dong, M. (2021). Uav-based real-time survivor detection system in post-disaster search and rescue operations. IEEE Journal on Miniaturization for Air and Space Systems., 2(4), 209\u2013219.","journal-title":"IEEE Journal on Miniaturization for Air and Space Systems."},{"issue":"3","key":"9741_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.3390\/fire5030075","volume":"5","author":"K Wang","year":"2022","unstructured":"Wang, K., Yuan, Y., Chen, M., Lou, Z., Zhu, Z., & Li, R. (2022). A study of fire drone extinguishing system in high-rise buildings. Fire., 5(3), 75.","journal-title":"Fire."},{"key":"9741_CR13","volume-title":"Interfaces for Ground and Air Military Robots: Workshop Summary","author":"NR Council","year":"2005","unstructured":"Council, N. R., et al. (2005). Interfaces for Ground and Air Military Robots: Workshop Summary. Washington, D.C.: National Academies Press."},{"key":"9741_CR14","doi-asserted-by":"crossref","unstructured":"Pettitt, R., Elliott, L.R., & Swiecicki, C.C. (2017). Squad-level soldier-robot dynamics: Exploring future concepts involving intelligent autonomous robots. In International Conference on Virtual, Augmented and Mixed Reality, pp. 426\u2013436. Springer.","DOI":"10.1007\/978-3-319-57987-0_35"},{"issue":"4","key":"9741_CR15","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1609\/aimag.v35i4.2556","volume":"35","author":"L Yliniemi","year":"2014","unstructured":"Yliniemi, L., Agogino, A. K., & Tumer, K. (2014). Multirobot coordination for space exploration. AI Magazine., 35(4), 61\u201374.","journal-title":"AI Magazine."},{"key":"9741_CR16","doi-asserted-by":"crossref","unstructured":"Barker, L.D., & Whitcomb, L.L. (2016) A preliminary survey of underwater robotic vehicle design and navigation for under-ice operations. In 2016 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), pp. 2028\u20132035. IEEE.","DOI":"10.1109\/IROS.2016.7759319"},{"key":"9741_CR17","doi-asserted-by":"crossref","unstructured":"Burnett, C., & Oren, N. (2021). Sub-delegation and trust. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 3, pp. 1359\u20131360.","DOI":"10.65109\/SDBB4252"},{"key":"9741_CR18","doi-asserted-by":"crossref","unstructured":"Sabater, J., & Sierra, C. (2001). Regret: reputation in gregarious societies. In Proceedings of the Fifth International Conference on Autonomous Agents, pp. 194\u2013195.","DOI":"10.1145\/375735.376110"},{"key":"9741_CR19","unstructured":"Huynh, T.D., Jennings, N.R., & Shadbolt, N. (2004). Fire: An integrated trust and reputation model for open multi-agent systems. In In Proceedings of the 16th European Conference on Artificial Intelligence (ECAI), pp. 18\u201322."},{"key":"9741_CR20","doi-asserted-by":"crossref","unstructured":"Griffiths, N. (2005). Task delegation using experience-based multi-dimensional trust. In Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 489\u2013496.","DOI":"10.1145\/1082473.1082548"},{"key":"9741_CR21","unstructured":"Sabater, J., Paolucci, M., & Conte, R. (2006). Repage: Reputation and image among limited autonomous partners. Journal of artificial societies and social simulation,9(2)."},{"issue":"2","key":"9741_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2815595","volume":"48","author":"J-H Cho","year":"2015","unstructured":"Cho, J.-H., Chan, K., & Adali, S. (2015). A survey on trust modeling. ACM Computing Surveys (CSUR)., 48(2), 1\u201340.","journal-title":"ACM Computing Surveys (CSUR)."},{"key":"9741_CR23","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C., & Falcone, R. (2020). Trust: Perspectives in cognitive science. In The Routledge Handbook of Trust and Philosophy, pp. 214\u2013228. Routledge, New York.","DOI":"10.4324\/9781315542294-17"},{"key":"9741_CR24","doi-asserted-by":"crossref","unstructured":"Afanador, J., Oren, N., & Baptista, M.S. (2019). A coalitional algorithm for recursive delegation. In International Conference on Principles and Practice of Multi-Agent Systems, pp. 405\u2013422. Springer.","DOI":"10.1007\/978-3-030-33792-6_25"},{"key":"9741_CR25","doi-asserted-by":"crossref","unstructured":"Rocha Costa, A.C., & Dimuro, G.P. (2006). Quantifying degrees of dependence in social dependence relations. In International Workshop on Multi-Agent Systems and Agent-Based Simulation, pp. 172\u2013187. Springer.","DOI":"10.1007\/978-3-540-76539-4_13"},{"key":"9741_CR26","doi-asserted-by":"crossref","unstructured":"Sichman, J.S., & Conte, R. (2002). Multi-agent dependence by dependence graphs. In Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 1, pp. 483\u2013490.","DOI":"10.1145\/544741.544855"},{"key":"9741_CR27","unstructured":"Sichman, J.S., Conte, R., Demazeau, Y., & Castelfranchi, C. (1998). A social reasoning mechanism based on dependence networks. In Proceedings of 11th European Conference on Artificial Intelligence, pp. 416\u2013420."},{"key":"9741_CR28","unstructured":"Turgay, E., Oner, D., & Tekin, C. (2018). Multi-objective contextual bandit problem with similarity information. In International Conference on Artificial Intelligence and Statistics, pp. 1673\u20131681. PMLR."},{"key":"9741_CR29","first-page":"215","volume":"3","author":"C Castelfranchi","year":"1992","unstructured":"Castelfranchi, C., Miceli, M., & Cesta, A. (1992). Dependence relations among autonomous agents. Decentralized AI., 3, 215\u2013227.","journal-title":"Decentralized AI."},{"key":"9741_CR30","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-1159-5","volume-title":"Reputation in Artificial Societies: Social Beliefs for Social Order","author":"R Conte","year":"2002","unstructured":"Conte, R., & Paolucci, M. (2002). Reputation in Artificial Societies: Social Beliefs for Social Order (Vol. 6). USA: Springer."},{"issue":"1","key":"9741_CR31","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MIS.2015.98","volume":"31","author":"F Buccafurri","year":"2015","unstructured":"Buccafurri, F., Comi, A., Lax, G., & Rosaci, D. (2015). Experimenting with certified reputation in a competitive multi-agent scenario. IEEE Intelligent Systems., 31(1), 48\u201355.","journal-title":"IEEE Intelligent Systems."},{"key":"9741_CR32","doi-asserted-by":"crossref","unstructured":"Drugan, M.M., & Nowe, A. (2013). Designing multi-objective multi-armed bandits algorithms: A study. In The 2013 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE.","DOI":"10.1109\/IJCNN.2013.6707036"},{"issue":"2","key":"9741_CR33","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., & Fischer, P. (2002). Finite-time analysis of the multiarmed bandit problem. Machine learning., 47(2), 235\u2013256.","journal-title":"Machine learning."},{"issue":"1","key":"9741_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10458-022-09552-y","volume":"36","author":"CF Hayes","year":"2022","unstructured":"Hayes, C. F., R\u0103dulescu, R., Bargiacchi, E., K\u00e4llstr\u00f6m, J., Macfarlane, M., Reymond, M., Verstraeten, T., Zintgraf, L. M., Dazeley, R., Heintz, F., et al. (2022). A practical guide to multi-objective reinforcement learning and planning. Autonomous Agents and Multi-Agent Systems., 36(1), 1\u201359.","journal-title":"Autonomous Agents and Multi-Agent Systems."},{"key":"9741_CR35","unstructured":"Chapelle, O., & Li, L. (2011). An empirical evaluation of thompson sampling. Advances in neural information processing systems,24."},{"key":"9741_CR36","volume-title":"Reinforcement Learning: An Introduction","author":"RS Sutton","year":"2018","unstructured":"Sutton, R. S., & Barto, A. G. (2018). Reinforcement Learning: An Introduction. USA: MIT press."},{"key":"9741_CR37","unstructured":"Cantucci, F., Falcone, R., & Castelfranchi, C. (2019). A computational model for cognitive human-robot interaction: An approach based on theory of delegation. In: WOA, pp. 127\u2013133."},{"issue":"1","key":"9741_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10462-011-9277-z","volume":"40","author":"I Pinyol","year":"2013","unstructured":"Pinyol, I., & Sabater-Mir, J. (2013). Computational trust and reputation models for open multi-agent systems: a review. Artificial Intelligence Review., 40(1), 1\u201325.","journal-title":"Artificial Intelligence Review."},{"issue":"2","key":"9741_CR39","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1075\/pc.15.2.05cas","volume":"15","author":"C Castelfranchi","year":"2007","unstructured":"Castelfranchi, C., & Guerini, M. (2007). Is it a promise or a threat? Pragmatics & Cognition., 15(2), 277\u2013311.","journal-title":"Pragmatics & Cognition."},{"key":"9741_CR40","doi-asserted-by":"crossref","unstructured":"Conte, R., & Paolucci, M. (2003). Social cognitive factors of unfair ratings in reputation reporting systems. In Proceedings IEEE\/WIC International Conference on Web Intelligence (WI 2003), pp. 316\u2013322. IEEE.","DOI":"10.1109\/WI.2003.1241210"},{"key":"9741_CR41","doi-asserted-by":"crossref","unstructured":"Botelho, V., Kredens, K.V., Martins, J.V., \u00c1vila, B.C., & Scalabrin, E.E. (2018). Dossier: decentralized trust model towards a decentralized demand. In 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD)), pp. 371\u2013376. IEEE.","DOI":"10.1109\/CSCWD.2018.8465141"},{"issue":"12","key":"9741_CR42","doi-asserted-by":"publisher","first-page":"2672","DOI":"10.1093\/ietisy\/e88-d.12.2672","volume":"88","author":"B An","year":"2005","unstructured":"An, B., Miao, C., & Cheng, D. (2005). A coalition formation framework based on transitive dependence. IEICE transactions on information and systems., 88(12), 2672\u20132680.","journal-title":"IEICE transactions on information and systems."},{"issue":"3","key":"9741_CR43","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1109\/TII.2007.902255","volume":"3","author":"B An","year":"2007","unstructured":"An, B., Shen, Z., Miao, C., & Cheng, D. (2007). Algorithms for transitive dependence-based coalition formation. IEEE Transactions on Industrial Informatics., 3(3), 234\u2013245.","journal-title":"IEEE Transactions on Industrial Informatics."},{"key":"9741_CR44","doi-asserted-by":"crossref","unstructured":"Chugh, T. (2020). Scalarizing functions in bayesian multiobjective optimization. In 2020 IEEE Congress on Evolutionary Computation (CEC), pp. 1\u20138 (2020). IEEE.","DOI":"10.1109\/CEC48606.2020.9185706"},{"key":"9741_CR45","doi-asserted-by":"crossref","unstructured":"Agarwal, M., Aggarwal, V., & Lan, T. (2022). Multi-objective reinforcement learning with non-linear scalarization. In Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, pp. 9\u201317.","DOI":"10.65109\/LNGI4831"},{"key":"9741_CR46","unstructured":"Russell, S., & Norvig, P. (2021). Artificial Intelligence: A Modern Approach. Pearson."},{"key":"9741_CR47","unstructured":"Cantucci, F., Falcone, R., & Castelfranchi, C. (2021). Robot\u2019s self-trust as precondition for being a good collaborator. In: TRUST@ AAMAS."},{"issue":"1","key":"9741_CR48","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1109\/TSMCA.2003.818878","volume":"34","author":"CD Stylios","year":"2004","unstructured":"Stylios, C. D., & Groumpos, P. P. (2004). Modeling complex systems using fuzzy cognitive maps. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans., 34(1), 155\u2013162.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans."},{"issue":"05","key":"9741_CR49","doi-asserted-by":"publisher","first-page":"1450020","DOI":"10.1142\/S0219525914500209","volume":"17","author":"M Ashtiani","year":"2014","unstructured":"Ashtiani, M., & Azgomi, M. A. (2014). Contextuality, incompatibility and biased inference in a quantum-like formulation of computational trust. Advances in Complex Systems., 17(05), 1450020.","journal-title":"Advances in Complex Systems."},{"issue":"2","key":"9741_CR50","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s10462-012-9371-x","volume":"43","author":"BPL Lau","year":"2015","unstructured":"Lau, B. P. L., Singh, A. K., & Tan, T. P. L. (2015). A review on dependence graph in social reasoning mechanism. Artificial Intelligence Review., 43(2), 229\u2013242.","journal-title":"Artificial Intelligence Review."},{"key":"9741_CR51","doi-asserted-by":"crossref","unstructured":"Bordini, R.H., & H\u00fcbner, J.F. (2005). Bdi agent programming in agentspeak using jason. In International Workshop on Computational Logic in Multi-Agent Systems, pp. 143\u2013164. Springer.","DOI":"10.1007\/11750734_9"},{"key":"9741_CR52","doi-asserted-by":"crossref","unstructured":"Rao, A.S. (1996). Agentspeak (l): Bdi agents speak out in a logical computable language. In European Workshop on Modelling Autonomous Agents in a Multi-agent World, pp. 42\u201355. Springer.","DOI":"10.1007\/BFb0031845"},{"key":"9741_CR53","doi-asserted-by":"crossref","unstructured":"Barab\u00e1si, A.-L., & Albert, R. (1999). Emergence of scaling in random networks. Science,286(5439), 509\u2013512.","DOI":"10.1126\/science.286.5439.509"},{"key":"9741_CR54","unstructured":"AWS (2023). Amazon Web Services. Accessed on 30, 06, 2023. https:\/\/aws.amazon.com\/pt\/?nc2=h_lg."},{"key":"9741_CR55","doi-asserted-by":"crossref","unstructured":"Garivier, A., & Moulines, E. (2011) On upper-confidence bound policies for switching bandit problems. In International Conference on Algorithmic Learning Theory, pp. 174\u2013188. Springer.","DOI":"10.1007\/978-3-642-24412-4_16"},{"key":"9741_CR56","unstructured":"N., A. (2021). Multi-Armed Bandits: Epsilon-Greedy Algorithm with Python Code. Accessed on 06, 06, 2023. https:\/\/medium.com\/@eminik355."},{"issue":"3","key":"9741_CR57","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/j.ecocom.2005.04.005","volume":"2","author":"MD Shirley","year":"2005","unstructured":"Shirley, M. D., & Rushton, S. P. (2005). The impacts of network topology on disease spread. Ecological Complexity., 2(3), 287\u2013299.","journal-title":"Ecological Complexity."},{"key":"9741_CR58","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s10462-012-9343-1","volume":"42","author":"S Bijani","year":"2014","unstructured":"Bijani, S., & Robertson, D. (2014). A review of attacks and security approaches in open multi-agent systems. Artificial Intelligence Review., 42, 607\u2013636.","journal-title":"Artificial Intelligence Review."},{"key":"9741_CR59","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s11229-006-9156-3","volume":"155","author":"C Castelfranchi","year":"2007","unstructured":"Castelfranchi, C., & Paglieri, F. (2007). The role of beliefs in goal dynamics: Prolegomena to a constructive theory of intentions. Synthese., 155, 237\u2013263.","journal-title":"Synthese."},{"key":"9741_CR60","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C., Dignum, F., Jonker, C.M., & Treur, J. (2000). Deliberative normative agents: Principles and architecture. In Intelligent Agents VI. Agent Theories, Architectures, and Languages: 6th International Workshop, ATAL\u201999, Orlando, Florida, USA, July 15\u201317, 1999. Proceedings 6, pp. 364\u2013378. Springer.","DOI":"10.1007\/10719619_27"},{"key":"9741_CR61","unstructured":"Dhurandhar, A., Chen, P.-Y., Luss, R., Tu, C.-C., Ting, P., Shanmugam, K., & Das, P. (2018). Explanations based on the missing: Towards contrastive explanations with pertinent negatives. Advances in Neural Information Processing Systems,31."},{"key":"9741_CR62","doi-asserted-by":"crossref","unstructured":"Jacovi, A., Swayamdipta, S., Ravfogel, S., Elazar, Y., Choi, Y., & Goldberg, Y. (2021). Contrastive explanations for model interpretability. arXiv preprint arXiv:2103.01378.","DOI":"10.18653\/v1\/2021.emnlp-main.120"},{"key":"9741_CR63","unstructured":"Jasinski, H.M., Morveli-Espinoza, M., & Tacla, C.A. (2020). Argagent: a simulator of goal processing for argumentative agents. Computational Models of Argument, pp. 469\u2013470."}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-026-09741-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10458-026-09741-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-026-09741-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T01:53:26Z","timestamp":1773107606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10458-026-09741-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,10]]},"references-count":63,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["9741"],"URL":"https:\/\/doi.org\/10.1007\/s10458-026-09741-z","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"value":"1387-2532","type":"print"},{"value":"1573-7454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,10]]},"assertion":[{"value":"13 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"15"}}