{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:22Z","timestamp":1750306282472,"version":"3.41.0"},"reference-count":68,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2016,6,6]],"date-time":"2016-06-06T00:00:00Z","timestamp":1465171200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"crossref"}]},{"name":"OC-Trust research unit","award":["FOR 1085"],"award-info":[{"award-number":["FOR 1085"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Auton. Adapt. Syst."],"published-print":{"date-parts":[[2016,7,25]]},"abstract":"<jats:p>Self-organized systems typically consist of distributed autonomous entities. An increasing part of such systems is characterized by openness and heterogeneity of participants. For instance, open desktop computing grids provide a framework for unrestrictedly joining in. However, openness and heterogeneity present severe challenges to the overall system\u2019s stability and efficiency since uncooperative and even malicious participants are free to join. A promising solution for this problem is to introduce technical trust as a basis; however, in turn, the utilization of trust opens space for negative emergent behavior. This article introduces a system-wide observation and control loop that influences the self-organized behavior to provide a performant and robust platform for benevolent participants. Thereby, the observation part is responsible for gathering information and deriving a system description. We introduce a graph-based approach to identify groups of suspicious or malicious agents and demonstrate that this clustering process is highly successful for the considered stereotype agent behaviors. In addition, the controller part guides the system behavior by issuing norms that make use of incentives and sanctions. We further present a concept for closing the control loop and show experimental results that highlight the potential benefit of establishing such a control loop.<\/jats:p>","DOI":"10.1145\/2890507","type":"journal-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T13:00:33Z","timestamp":1465563633000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Controlling Negative Emergent Behavior by Graph Analysis at Runtime"],"prefix":"10.1145","volume":"11","author":[{"given":"Jan","family":"Kantert","sequence":"first","affiliation":[{"name":"Leibniz University of Hannover, Hanover, Germany"}]},{"given":"Sven","family":"Tomforde","sequence":"additional","affiliation":[{"name":"University of Augsburg, Augsburg, Germany"}]},{"given":"Melanie","family":"Kauder","sequence":"additional","affiliation":[{"name":"Leibniz University of Hannover, Hanover, Germany"}]},{"given":"Richard","family":"Scharrer","sequence":"additional","affiliation":[{"name":"Leibniz University of Hannover, Hanover, Germany"}]},{"given":"Sarah","family":"Edenhofer","sequence":"additional","affiliation":[{"name":"University of Augsburg, Augsburg, Germany"}]},{"given":"J\u00f6rg","family":"H\u00e4hner","sequence":"additional","affiliation":[{"name":"University of Augsburg, Augsburg, Germany"}]},{"given":"Christian","family":"M\u00fcller-Schloer","sequence":"additional","affiliation":[{"name":"Leibniz University of Hannover, Hanover, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,6,6]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2006.101"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGRID.2006.310998"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2008.23"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02562-4_2"},{"key":"e_1_2_1_5_1","volume-title":"Frank Dignum, Emiliano Lorini, Antonino Rotolo, Wamberto Vasconcelos, and Serena Villata.","author":"Balke Tina","year":"2013","unstructured":"Tina Balke , Celia da Costa Pereira , Frank Dignum, Emiliano Lorini, Antonino Rotolo, Wamberto Vasconcelos, and Serena Villata. 2013 . Norms in MAS : Definitions and related concepts. In Normative Multi-Agent Systems. Dagstuhl Follow-Ups, Vol. 4 . Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany , 1--31. Tina Balke, Celia da Costa Pereira, Frank Dignum, Emiliano Lorini, Antonino Rotolo, Wamberto Vasconcelos, and Serena Villata. 2013. Norms in MAS: Definitions and related concepts. In Normative Multi-Agent Systems. Dagstuhl Follow-Ups, Vol. 4. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 1--31."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings the 1996 IEEE INFOCOM Conference","volume":"1","author":"Jon C.","unstructured":"Jon C. R. Bennett and Hui Zhang. 1996. WF2Q: Worst-case fair weighted fair queueing . In Proceedings the 1996 IEEE INFOCOM Conference , Vol. 1 . IEEE, Los Alamitos, CA, 120--128. Jon C. R. Bennett and Hui Zhang. 1996. WF2Q: Worst-case fair weighted fair queueing. In Proceedings the 1996 IEEE INFOCOM Conference, Vol. 1. IEEE, Los Alamitos, CA, 120--128."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SASOW.2011.28"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/3.4.379"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"volume-title":"Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik","author":"Boella Guido","key":"e_1_2_1_10_1","unstructured":"Guido Boella , Gabriella Pigozzi , and Leendert van der Torre . 2009. Normative systems in computer science: Ten guidelines for normative multiagent systems . In Normative Multi-Agent Systems, G. Boella, P. Noriega, G. Pigozzi, and H. Verhagen (Eds.). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik , Dagstuhl, Germany , 1--21. Guido Boella, Gabriella Pigozzi, and Leendert van der Torre. 2009. Normative systems in computer science: Ten guidelines for normative multiagent systems. In Normative Multi-Agent Systems, G. Boella, P. Noriega, G. Pigozzi, and H. Verhagen (Eds.). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 1--21."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1875387"},{"key":"e_1_2_1_13_1","first-page":"1","article-title":"Deterministic initialization of the k-means algorithm using hierarchical clustering","volume":"26","author":"Emre Celebi M.","year":"2012","unstructured":"M. Emre Celebi and Hassan A. Kingravi . 2012 . Deterministic initialization of the k-means algorithm using hierarchical clustering . International Journal of Pattern Recognition and Artificial Intelligence 26 , 07, 1 -- 25 . M. Emre Celebi and Hassan A. Kingravi. 2012. Deterministic initialization of the k-means algorithm using hierarchical clustering. International Journal of Pattern Recognition and Artificial Intelligence 26, 07, 1--25.","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/GRID.2004.11"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2007.31"},{"volume-title":"Intelligent Agents V: Agents Theories, Architectures, and Languages","author":"Conte Rosaria","key":"e_1_2_1_17_1","unstructured":"Rosaria Conte , Cristiano Castelfranchi , and Frank Dignum . 1999. Autonomous norm acceptance . In Intelligent Agents V: Agents Theories, Architectures, and Languages , J. P. M\u00fcller, A. S. Rao, and M. P. Singh (Eds.). Lecture Notes in Computer Science, Vol. 1555 . Springer , 99--112. Rosaria Conte, Cristiano Castelfranchi, and Frank Dignum. 1999. Autonomous norm acceptance. In Intelligent Agents V: Agents Theories, Architectures, and Languages, J. P. M\u00fcller, A. S. Rao, and M. P. Singh (Eds.). Lecture Notes in Computer Science, Vol. 1555. Springer, 99--112."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/75246.75248"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2006.12.001"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the 1996 KDD Conference","volume":"96","author":"Ester Martin","year":"1996","unstructured":"Martin Ester , Hans-Peter Kriegel , J\u00f6rg Sander , and Xiaowei Xu . 1996 . A density-based algorithm for discovering clusters in large spatial databases with noise . In Proceedings of the 1996 KDD Conference , Vol. 96 . 226--231. Martin Ester, Hans-Peter Kriegel, J\u00f6rg Sander, and Xiaowei Xu. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. In Proceedings of the 1996 KDD Conference, Vol. 96. 226--231."},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Ernst Fehr. 2004. Human behaviour: Don\u2019t lose your reputation. Nature 432 7016 449--450.  Ernst Fehr. 2004. Human behaviour: Don\u2019t lose your reputation. Nature 432 7016 449--450.","DOI":"10.1038\/432449a"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-008-9030-4"},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Garrett Hardin. 1968. The tragedy of the commons. Science 162 3859 1243--1248.  Garrett Hardin. 1968. The tragedy of the commons. Science 162 3859 1243--1248.","DOI":"10.1126\/science.162.3859.1243"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(91)90051-K"},{"volume-title":"Advances in Intelligent","author":"Hinneburg Alexander","key":"e_1_2_1_25_1","unstructured":"Alexander Hinneburg and Hans-Henning Gabriel . 2007. DENCLUE 2.0 : Fast clustering based on kernel density estimation . In Advances in Intelligent Data Analysis VII. Springer , Berlin, Germany , 70--80. Alexander Hinneburg and Hans-Henning Gabriel. 2007. DENCLUE 2.0: Fast clustering based on kernel density estimation. In Advances in Intelligent Data Analysis VII. Springer, Berlin, Germany, 70--80."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.18564\/jasss.1750"},{"key":"e_1_2_1_27_1","unstructured":"Raj Jain Gojko Babic Bhavana Nagendra and Chi-Chung Lam. 1996. Fairness call establishment latency and other performance metrics. ATM-Forum 96 1173 1--6.  Raj Jain Gojko Babic Bhavana Nagendra and Chi-Chung Lam. 1996. Fairness call establishment latency and other performance metrics. ATM-Forum 96 1173 1--6."},{"volume-title":"Mathematical Taxonomy","author":"Jardine Nicholas","key":"e_1_2_1_28_1","unstructured":"Nicholas Jardine and Robin Sibson . 1971. Mathematical Taxonomy . John Wiley & Sons , Chichester, UK . Nicholas Jardine and Robin Sibson. 1971. Mathematical Taxonomy. John Wiley & Sons, Chichester, UK."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005548402460253"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the Poster Session of the 2015 ARCS Conference. 13--14","author":"Kantert Jan","year":"2015","unstructured":"Jan Kantert , Sarah Edenhofer , Sven Tomforde , J\u00f6rg H\u00e4hner , and Christian M\u00fcller-Schloer . 2015 c. Norm-based system control in distributed low-power sensor networks . In Proceedings of the Poster Session of the 2015 ARCS Conference. 13--14 . Jan Kantert, Sarah Edenhofer, Sven Tomforde, J\u00f6rg H\u00e4hner, and Christian M\u00fcller-Schloer. 2015c. Norm-based system control in distributed low-power sensor networks. In Proceedings of the Poster Session of the 2015 ARCS Conference. 13--14."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2015.66"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2014.20"},{"key":"e_1_2_1_33_1","volume-title":"Architecture of Computing Systems\u2014ARCS","author":"Kantert Jan","year":"2015","unstructured":"Jan Kantert , Sergej Wildemann , Georg von Zengen , Sarah Edenhofer , Sven Tomforde , Lars Wolf , J\u00f6rg H\u00e4hner , and Christian M\u00fcller-Schloer . 2015d. Improving reliability and endurance using end-to-end trust in distributed low-power sensor networks . In Architecture of Computing Systems\u2014ARCS 2015 . LNCS Lecture Notes in Computer Science, Vol. 9017 . Springer , 135--145. Jan Kantert, Sergej Wildemann, Georg von Zengen, Sarah Edenhofer, Sven Tomforde, Lars Wolf, J\u00f6rg H\u00e4hner, and Christian M\u00fcller-Schloer. 2015d. Improving reliability and endurance using end-to-end trust in distributed low-power sensor networks. In Architecture of Computing Systems\u2014ARCS 2015. LNCS Lecture Notes in Computer Science, Vol. 9017. Springer, 135--145."},{"key":"e_1_2_1_34_1","volume-title":"Kirk","author":"Khamsi Mohamed A.","year":"2011","unstructured":"Mohamed A. Khamsi and William A . Kirk . 2011 . An Introduction to Metric Spaces and Fixed Point Theory. Vol. 53 . John Wiley & Sons , Chichester, UK. Mohamed A. Khamsi and William A. Kirk. 2011. An Introduction to Metric Spaces and Fixed Point Theory. Vol. 53. John Wiley & Sons, Chichester, UK."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_2_1_36_1","unstructured":"Lukas Klejnowski. 2014. Trusted Community: A Novel Multiagent Organisation for Open Distributed Systems. Ph.D. Dissertation. Leibniz Universit\u00e4t Hannover. http:\/\/edok01.tib.uni-hannover.de\/ edoks\/e01dh11\/668667427.pdf.  Lukas Klejnowski. 2014. Trusted Community: A Novel Multiagent Organisation for Open Distributed Systems. Ph.D. Dissertation. Leibniz Universit\u00e4t Hannover. http:\/\/edok01.tib.uni-hannover.de\/ edoks\/e01dh11\/668667427.pdf."},{"key":"e_1_2_1_37_1","volume-title":"Big Buck Bunny 3D Rendering Exploration. Retrieved","author":"Kristensen Janus B.","year":"2016","unstructured":"Janus B. Kristensen . 2014. Big Buck Bunny 3D Rendering Exploration. Retrieved May 2, 2016 , from http:\/\/bbb3d.renderfarming.net\/explore.html. Janus B. Kristensen. 2014. Big Buck Bunny 3D Rendering Exploration. Retrieved May 2, 2016, from http:\/\/bbb3d.renderfarming.net\/explore.html."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.056131"},{"volume-title":"Aspects of Artificial Intelligence","author":"Nute Donald","key":"e_1_2_1_42_1","unstructured":"Donald Nute . 1988. Defeasible reasoning: A philosophical analysis in prolog . In Aspects of Artificial Intelligence . Springer , Berlin, Germany , 251--288. Donald Nute. 1988. Defeasible reasoning: A philosophical analysis in prolog. In Aspects of Artificial Intelligence. Springer, Berlin, Germany, 251--288."},{"volume-title":"Handbook of Logic in Artificial Intelligence and Logic Programming","author":"Nute Donald","key":"e_1_2_1_43_1","unstructured":"Donald Nute . 1994. Defeasible logic . In Handbook of Logic in Artificial Intelligence and Logic Programming . Oxford University Press , New York, NY , 353--395. Donald Nute. 1994. Defeasible logic. In Handbook of Logic in Artificial Intelligence and Logic Programming. Oxford University Press, New York, NY, 353--395."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1767370.1767386"},{"key":"e_1_2_1_45_1","first-page":"1","article-title":"Analysis and visualization of network data using JUNG","volume":"10","author":"O\u2019Madadhain Joshua","year":"2005","unstructured":"Joshua O\u2019Madadhain , Danyel Fisher , Padhraic Smyth , Scott White , and Yan-Biao Boey . 2005 . Analysis and visualization of network data using JUNG . Journal of Statistical Software 10 , 2, 1 -- 35 . Joshua O\u2019Madadhain, Danyel Fisher, Padhraic Smyth, Scott White, and Yan-Biao Boey. 2005. Analysis and visualization of network data using JUNG. Journal of Statistical Software 10, 2, 1--35.","journal-title":"Journal of Statistical Software"},{"volume-title":"Governing the Commons: The Evolution of Institutions for Collective Action","author":"Ostrom Elinor","key":"e_1_2_1_46_1","unstructured":"Elinor Ostrom . 1990. Governing the Commons: The Evolution of Institutions for Collective Action . Cambridge University Press , Cambridge, MA . Elinor Ostrom. 1990. Governing the Commons: The Evolution of Institutions for Collective Action. Cambridge University Press, Cambridge, MA."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2011.25"},{"volume-title":"Rules of Encounter: Designing Conventions for Automated Negotiation Among Computers. MIT Press","author":"Jeffrey","key":"e_1_2_1_48_1","unstructured":"Jeffrey S. Rosenschein and Gilad Zlotkin. 1994 . Rules of Encounter: Designing Conventions for Automated Negotiation Among Computers. MIT Press , Cambridge, MA. Jeffrey S. Rosenschein and Gilad Zlotkin. 1994. Rules of Encounter: Designing Conventions for Automated Negotiation Among Computers. MIT Press, Cambridge, MA."},{"key":"e_1_2_1_49_1","volume-title":"Legal Reasoning: A Cognitive Approach to Law","author":"Sartor Giovanni","year":"2005","unstructured":"Giovanni Sartor . 2005 . Legal Reasoning: A Cognitive Approach to Law . Springer, Berlin , Germany . Giovanni Sartor. 2005. Legal Reasoning: A Cognitive Approach to Law. Springer, Berlin, Germany."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/2019196.2019199"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2007.05.001"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837909.1837911"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s007780050009"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008319631231"},{"key":"e_1_2_1_55_1","volume-title":"Normative Multi-Agent Systems. Dagstuhl Follow-Ups","volume":"4","author":"Singh Munindar P.","year":"2013","unstructured":"Munindar P. Singh , Matthew Arrott , Tina Balke , Amit K. Chopra , Rob Christiaanse , Stephen Cranefield , Frank Dignum , 2013 . The uses of norms . In Normative Multi-Agent Systems. Dagstuhl Follow-Ups , Vol. 4 . Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 191--229. Munindar P. Singh, Matthew Arrott, Tina Balke, Amit K. Chopra, Rob Christiaanse, Stephen Cranefield, Frank Dignum, et al. 2013. The uses of norms. In Normative Multi-Agent Systems. Dagstuhl Follow-Ups, Vol. 4. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 191--229."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SASOW.2014.34"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/1927943.1927949"},{"key":"e_1_2_1_58_1","volume-title":"CNet. Retrieved","author":"Terdiman Daniel","year":"2016","unstructured":"Daniel Terdiman . 2011. New technology revs up Pixar\u2019s \u2018Cars 2 .\u2019 CNet. Retrieved May 2, 2016 , from http:\/\/www.cnet.com\/news\/new-technology-revs-up-pixars-cars-2\/. Daniel Terdiman. 2011. New technology revs up Pixar\u2019s \u2018Cars 2.\u2019 CNet. Retrieved May 2, 2016, from http:\/\/www.cnet.com\/news\/new-technology-revs-up-pixars-cars-2\/."},{"volume-title":"Organic Computing\u2014A Paradigm Shift for Complex Systems","author":"Tomforde Sven","key":"e_1_2_1_59_1","unstructured":"Sven Tomforde , Holger Prothmann , J\u00fcrgen Branke , J\u00f6rg H\u00e4hner , Moez Mnif , Christian M\u00fcller-Schloer , Urban Richter , and Hartmut Schmeck . 2011. Observation and control of organic systems . In Organic Computing\u2014A Paradigm Shift for Complex Systems . Birkh\u00e4user, Basel , Switzerland , 325--338. Sven Tomforde, Holger Prothmann, J\u00fcrgen Branke, J\u00f6rg H\u00e4hner, Moez Mnif, Christian M\u00fcller-Schloer, Urban Richter, and Hartmut Schmeck. 2011. Observation and control of organic systems. In Organic Computing\u2014A Paradigm Shift for Complex Systems. Birkh\u00e4user, Basel, Switzerland, 325--338."},{"key":"e_1_2_1_60_1","first-page":"41","article-title":"Norms and agreements","volume":"5","author":"Tuomela Raimo","year":"1995","unstructured":"Raimo Tuomela and Maj Bonnevier-Tuomela . 1995 . Norms and agreements . European Journal of Law, Philosophy and Computer Science 5 , 41 -- 46 . Raimo Tuomela and Maj Bonnevier-Tuomela. 1995. Norms and agreements. European Journal of Law, Philosophy and Computer Science 5, 41--46.","journal-title":"European Journal of Law, Philosophy and Computer Science"},{"volume-title":"Intelligent Distributed Computing VI. Studies in Computational Intelligence","author":"Urzic\u0103 Andreea","key":"e_1_2_1_61_1","unstructured":"Andreea Urzic\u0103 and Cristian Gratie . 2013. Policy-based instantiation of norms in MAS . In Intelligent Distributed Computing VI. Studies in Computational Intelligence , Vol. 446 . Springer , 287--296. Andreea Urzic\u0103 and Cristian Gratie. 2013. Policy-based instantiation of norms in MAS. In Intelligent Distributed Computing VI. Studies in Computational Intelligence, Vol. 446. Springer, 287--296."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2008.02.001"},{"volume-title":"Norms and Action: A Logical Enquiry","author":"von Wright Georg Henrik","key":"e_1_2_1_64_1","unstructured":"Georg Henrik von Wright . 1963. Norms and Action: A Logical Enquiry . Routledge & Kegan Paul , London, UK . Georg Henrik von Wright. 1963. Norms and Action: A Logical Enquiry. Routledge & Kegan Paul, London, UK."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025132.1026340"},{"volume-title":"The Object Constraint Language: Precise Modeling with UML","author":"Warmer Jos","key":"e_1_2_1_66_1","unstructured":"Jos Warmer and Anneke Kleppe . 1999. The Object Constraint Language: Precise Modeling with UML . Addison Wesley Longman, Boston , MA. Jos Warmer and Anneke Kleppe. 1999. The Object Constraint Language: Precise Modeling with UML. Addison Wesley Longman, Boston, MA."},{"volume-title":"Social Network Analysis: Methods and Applications","author":"Wasserman Stanley","key":"e_1_2_1_67_1","unstructured":"Stanley Wasserman . 1994. Social Network Analysis: Methods and Applications . Vol. 8 . Cambridge University Press , Cambridge, MA . Stanley Wasserman. 1994. Social Network Analysis: Methods and Applications. Vol. 8. Cambridge University Press, Cambridge, MA."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-94"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.845141"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/235968.233324"}],"container-title":["ACM Transactions on Autonomous and Adaptive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2890507","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2890507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:55Z","timestamp":1750221535000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2890507"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,6]]},"references-count":68,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,7,25]]}},"alternative-id":["10.1145\/2890507"],"URL":"https:\/\/doi.org\/10.1145\/2890507","relation":{},"ISSN":["1556-4665","1556-4703"],"issn-type":[{"type":"print","value":"1556-4665"},{"type":"electronic","value":"1556-4703"}],"subject":[],"published":{"date-parts":[[2016,6,6]]},"assertion":[{"value":"2015-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}